02.12.2019 Views

Cyber Defense eMagazine December 2019

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

47<br />

Visibility and Anomaly Detection in The Age of Iot<br />

By Craig Sanderson, Senior Director of Security Products at Infoblox<br />

Historically, organizations have struggled to gain visibility of what users, devices and applications<br />

are accessing their network infrastructure. If the maxim “you can’t protect what you can’t see”<br />

holds true, then the prospect of the Internet of Things (IoT) business transition which will result<br />

in billions of devices connecting to IP networks is a nightmare in waiting. Identification and<br />

classification of IoT devices is particularly problematic because the range of new device types<br />

leveraging the IP network is going to explode making it harder for IT security teams to manage<br />

and control policies that protect these new devices from themselves and the existing IP connected<br />

services.<br />

Beyond controlling accessing and setting policy, IoT also presents a sizable headache when it<br />

comes to detecting breaches and enabling effective response. The plethora of protocols that IoT<br />

devices will leverage, spanning a broad range of vertical industries from Healthcare to Retail will<br />

make it hard for traditional security platforms to detect breaches. Malware sandboxes whose<br />

expertise is identifying abuse of well-known operating systems such as Windows servers will<br />

have a steep learning curve to apply the same detection for the bespoke applications running on<br />

proprietary software platforms. Instead organizations will have to rely heavily on secure IoT<br />

endpoint platforms to try and reduce the potential attack surface area. Surely there must be a

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!