Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

The IoT introduces more asymmetry to the cybercrime battlefield

ForeScout Technologies : 24 March, 2016  (Technical Article)
ForeScout CEO explains how the benefits of the growing Internet of Things could be marred by the proliferation of unmanaged endpoints providing gateways for the bad guys
The IoT introduces more asymmetry to the cybercrime battlefield

In a recent post to LinkedIn Pulse, ForeScout Technologies' CEO, Mike DeCesare explains how the burgeoning Internet of Things (IoT) will bring massive benefits if it is secured correctly.

The rapid proliferation of devices becoming connected to home, corporate and industrial networks in the IoT requires a move away from the traditional methods of providing security through the use of "agent" software installed on each endpoint. IoT devices are predominently "agentless".

In his article, Mike explains that each of these endpoints represents a back door into the wider network to which it's attached, providing advantages to those who want to infiltrate it. Such assymetry in the cyber security battlefield introduces massive challenges to IT security professionals for keeping one step ahead of cyber criminals.

As Mike DeCesare explains, "It’s a daunting fight knowing us good guys need to defend every single entrance point to a network and the bad guys only need one single entrance point." However, all is most certainly not lost and the article explains how visibility of these unmanaged endpoints is the first step in maintaining control of a network's security and ensuring the IoT gives all the benefits it promises without letting the criminals in.

Read "An Asymmetrical Battlefield" on LinkedIn

Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo