Reactive versus proactive Information Security
Given the existing cyberenvironment in which enterprise devices (IoT) exists, it is pertinent to adopt a defense posture that is ahead of the adversaries. Definitely deploying defense in depth and adopting controls based on attack modes are not sufficient. Concurrently, it is impossible to encapsulate assets and resources with all possible controls in proverbial and not practical. Adopting a pragmatic approach based on right strategy that consists on being ahead of adversaries and staying ahead of adversaries is critical.