>> IoT SECURITY - ARE WE GOING ABOUT IT THE WRONG WAY?
This one is for the way-out-there department but makes for interesting 
discussion.
 
EET India 
published an article recently that makes a good point of questioning if
security within IoT and computing in general is being actually being 
tackled appropriately - instead of implementing physical security measures,
is there a possibility to learn from biology to protect and adapt against 
attacks to strengthen each node in a deployment?
While technology and biology are two completely different areas - after
reading the article and thinking about it closer, there are a lot of 
interesting points raised that if implemented correctly could see a rise
in adaptable security and diversity in technology; as nature models perfectly.
As HP has 
reported previously up to 70% of IoT devices are vulnerable, the main
reason for this is the lack of diversity and common 0-day attacks being
exploited across multiple devices, including the likes of shellshock,
heartbleed and blatant lack of security in the first place.
The article also covers the concept of immunological defence that 
can be adapted for use within technology - that threats are identified 
based on behavioral factors rather than a database of known signatures 
that are effectively out of date the second the product ships.
Once an alarm has been triggered the system must respond to the threat -
taking the immune style approach; the node could resolve the threat and
take one for the team yet at the same time alert neighbouring nodes of 
the threat to assist isolation of the threat and spawn a redundant node to 
replace the functions performed by the infected one. 
The basic gist is to start out expected to be attacked and focus on
protecting the health of the total system understanding a small 
sacrifice (with learning and fall back concepts) may be the best for 
the greater good overall - the concept is food for thought for sure.