Page 13 - index
P. 13
way to segment network traffic effectively and as such, this action provides organizations with
nothing more than a false sense of security. Segregation is a step in the right direction, but it
should only be a piece of a more broad defense-in-depth strategy.
The enterprise will be responsible for implementing IoT policies that ensure the security of their
corporate airspace, while not infringing on the privacy of employees, customers, and the
thousands of others that come in and out of their environments each day. New technology
needs to come to market to provide vulnerability assessment, intrusion detection and
localization across the wide spectrum of protocols of the IoT. The tremendous growth of IoT
brings the opportunity for innovation in security in the space. Organizations must be stay up-to-
date with these innovations, as well as government regulations, to best keep their environment
safe.
IoT is going to dramatically shift the way we think about the Internet, data and connectivity. We
are reaching a fundamental change in the perception of useful technology and the next five
years is going to be as disruptive to corporations as the Industrial Revolution. Information
Technology professionals need to remain mindful of these forthcoming changes, and never
assume that they have network security figured out, as organizations are going to face threats
and hacks that we never thought possible. From now until 2020, it is going to be one hell of a
ride.
About the Author
Chris Rouland is a cybersecurity expert and entrepreneur, and founder
and CEO of Bastille, the first company to detect and mitigate threats to
the Internet of Things.
13 Cyber Warnings E-Magazine – March 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide