Access "Internet of Things security: Who is responsible and how is it done?"
This article is part of the Special Edition, August 2014 issue of A comprehensive guide to securing the Internet of Things
Advocates say the Internet of Things is a multitrillion dollar business opportunity, but it's also a potential disaster for privacy and safety. Before we connect everything around us to the Internet, we need to think about security. Internet of Things security is difficult to discuss because the concept is so immense. When you make "everything" IP-connected, how do you lock all of that down? Cars, cows, oil rigs, medical devices, refrigerators. There is no perimeter that can encircle all of that. "The challenge we have is that each of those areas is really pretty separate," said Bret Hartman, "The technologies working in those areas tend to focus specifically on their own area. It's not going to be one-size-fits-all for [Internet of Things] security." Companies and individuals will also find that they lose a lot of control over where their data is and where it is going. When consumerization struck the enterprise, power and control over data and connectivity shifted from IT to the user. IT is still adapting to that shock. Now another shift is coming. "Power ... Access >>>
Premium Content for Free.
Internet of Things (IOT): Seven enterprise risks to consider
by Ajay Kumar, Contributor
The Internet of Things is a growing enterprise threat. Learn about the seven key IoT risks to prepare for before implementing an IoT policy.
- Internet of Things (IOT): Seven enterprise risks to consider by Ajay Kumar, Contributor
Securing the Internet of Things
by Kevin Beaver, Network Security
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
- Securing the Internet of Things by Kevin Beaver, Network Security
Internet of Things security: Who is responsible and how is it done?
by Shamus McGillicuddy
Securing the Internet of Things is almost too big a problem to think about. Who's responsible and how will they do it?
- Internet of Things security: Who is responsible and how is it done? by Shamus McGillicuddy
More Premium Content Accessible For Free
Strategies for a successful data protection program
Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...
Devices, data and how enterprise mobile management reconciles the two
The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...
Putting security on auto-pilot: What works, what doesn't
For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...