Cyber Defense eMagazine December 2019
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Cyber Defense eMagazine January Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group with Pierluigi Paganini, Yan Ross as International and US Editors-in-Chief and many more hard working amazing contributors!
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
47<br />
Visibility and Anomaly Detection in The Age of Iot<br />
By Craig Sanderson, Senior Director of Security Products at Infoblox<br />
Historically, organizations have struggled to gain visibility of what users, devices and applications<br />
are accessing their network infrastructure. If the maxim “you can’t protect what you can’t see”<br />
holds true, then the prospect of the Internet of Things (IoT) business transition which will result<br />
in billions of devices connecting to IP networks is a nightmare in waiting. Identification and<br />
classification of IoT devices is particularly problematic because the range of new device types<br />
leveraging the IP network is going to explode making it harder for IT security teams to manage<br />
and control policies that protect these new devices from themselves and the existing IP connected<br />
services.<br />
Beyond controlling accessing and setting policy, IoT also presents a sizable headache when it<br />
comes to detecting breaches and enabling effective response. The plethora of protocols that IoT<br />
devices will leverage, spanning a broad range of vertical industries from Healthcare to Retail will<br />
make it hard for traditional security platforms to detect breaches. Malware sandboxes whose<br />
expertise is identifying abuse of well-known operating systems such as Windows servers will<br />
have a steep learning curve to apply the same detection for the bespoke applications running on<br />
proprietary software platforms. Instead organizations will have to rely heavily on secure IoT<br />
endpoint platforms to try and reduce the potential attack surface area. Surely there must be a