Not a week goes by without some sort of vulnerability or breach associated with the IoT taking place. More devices, varied devices, and the rise of far more sophisticated attackers have led to big IT firms investing in their own security capabilities while our government issues executive orders trying to compel companies to invest in better security.
Today’s version of better security requires layers. And after a conversation with Kate Scarcella, chief cybersecurity architect at Micro Focus, I’m convinced that monitoring device behavior will be one of those layers. Much like law enforcement officials trying to assess threats look for suspicious behavior exhibited by people, Scarcella believes devices can provide a set of “tells” after they’ve been compromised.
All we need is software that can spot the one weird device out of thousands.
Continue reading: https://staceyoniot.com/forget-perimeters-for-security-look-at-device-behavior/
Today’s version of better security requires layers. And after a conversation with Kate Scarcella, chief cybersecurity architect at Micro Focus, I’m convinced that monitoring device behavior will be one of those layers. Much like law enforcement officials trying to assess threats look for suspicious behavior exhibited by people, Scarcella believes devices can provide a set of “tells” after they’ve been compromised.
All we need is software that can spot the one weird device out of thousands.
Continue reading: https://staceyoniot.com/forget-perimeters-for-security-look-at-device-behavior/