Cross-Industry Lessons Learned In IoT Industrial Network Cyber Security | Cyber Security Hub
As discussed in CISO Strategies for Incident Response, the cloud has expanded the perimeter exponentially. As the perimeter is now infinite, data and the user take the focus of security from old HQ endpoints. But that infinite perimeter also brings in new endpoints- IoT devices- further complicating matters. If everything from a human to a vending machine is technology that can be attacked, the posture of the enterprise has to adapt.