Dark Things

Things you own or use that can’t talk using your current identity layer. They are dark to you the way dark matter is massive but invisible. You might notice them, but indirectly.

We were talking identity debt. Our interviewees talked-around dark things. Gear that can’t identify themselves or your other systems well enough to be full participants, or even useful members, in your architecture.

A few network and IIoT management products differentiate themselves by trying to surface, locate, and profile dark things on your network, an attempt to reduce this “known unknown.”

Are dark things in your world dark because they are old? Or are they dark because they use proprietary protocols? Were they slipped past or through your workflows by eager folks? Missed by a facilities walkthrough? Or inserted by malicious fiends?

How do you quantify the mass of dark things in your cyberspace? What identity can you elicit from them? Can you wrap or cobble together meaningful identity services from the darkness?

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this:
search previous next tag category expand menu location phone mail time cart zoom edit close