Impact of IoT on Identity, Risk, and Security Programs
Security posture needs to adjust to the rapid rise of connected devices. Webcams, routers, plant sensors, point-of-sale solutions … all these have been vectors for attack – but there’s more to come. Industrial manufacturers have created smart turbines, robotic assembly lines, as well as ships and locomotives that make their own decisions based on a huge volumes of data provided by a swarm of sensors as well as from other machines. We need to learn – and apply – lessons we learned about human users with the advent of de-perimiterization. Things, it turns out, need Identity too!