Six Ways To Create a Jolt In Enterprise Security


# Internet of things can intersect with enterprise networks: The enterprise network keeps a track on the IoT traffic. If a hacker gets the access to any of the IoT devices, it stands as a medium to access the high end enterprise resources on the network.

"The IoT and enterprise network will intersect. If you can hack into a web-enabled device which also happens to have connectivity to the corporate network or infrastructure, you can create a bridge to pass traffic back and forth," said Amit Yoran, the former director of the National Cyber Security Division at the U.S. Department of Homeland Security.

# Internet of Things will be a world of heterogeneous, embedded devices: Many of the IoT devices run software which is embedded in the operating system on devices. This makes it difficult for the IT and IT security groups to secure devices as they do not have the layered software model with which they are familiar.

"The use of embedded computing in those devices, versus layered operating systems and applications in PCs and servers that IT is accustomed to managing and securing, will cause major breakage in existing IT management and IT security visibility," said John Pescatore, director of research at SANS institute.

READ MORE: Affiliated Websites Rev up E-Commerce Sales. And Finally TCS Gets Into The League Of Top 10 Global IT Services