Securing the Edge, Surveying Vulnerabilities in the Federal Government’s Internet of Things

In October 2016, vulnerabilities in Internet-connected devices enabled hackers to overload
server traffic from a leading web services provider, temporarily shutting down Internet
access across large parts of the eastern United States.1 The attack was the latest example
of the dangers facing the Internet of Things (IoT), the vast network of physical objects and
sensors being used to transmit data and automate basic functions. This is especially true in
government where employees increasingly rely on IoT devices to transmit sensitive, missioncritical
information from remote locations around the world. While the White House has
pursued aggressive cyber policy in the past year aimed at minimizing network vulnerabilities,
current procurement processes and outdated security architectures threaten to wind back
the clock, placing agency data and their devices in the line of fire.2
With the IoT now on pace to exceed 30 billion units by the year 20203 — and public sector IoT
growth poised to surpass private sector adoption rates by 20194 — the U.S. government’s
next steps are critical. In order to find out what federal leaders are doing to secure the data
on the devices in their own agencies, Government Business Council (GBC) on behalf of
Brocade undertook an in-depth research study in January 2017.

Full Report Here



Source: Government Business Council=