Working from home, enterprise security strategies have to contend with internet-connected refrigerators, decades-old routers and teenagers on TikTok hogging bandwidth.
Personal technology blends with enterprise technology, and data flows between devices, sanctioned or not.
"Our perimeter has moved to a teenager on TikTok," said Jeff Greene, director of the National Cybersecurity Center of Excellence at the National Institute for Standards and Technology (NIST), while speaking on a virtual panel hosted by Palo Alto Networks.
Since the bring-your-own-device movement disrupted traditional perimeter security, organizations have grappled with a new frontier and a broader attack surface. While there are solutions strong enough to withstand the obstacles IT is facing, such as zero trust architecture, there are plenty of security challenges.
Read more at: CIO Dive