The technology environment in almost every business is composed of an amalgamation of dozens, if not hundreds, of technology products. A security vulnerability in any one of these products may create a risk not only for that particular product, but for the business entire network. In 2016, the largest DDoS attack ever launched was based on an IoT botnet. This attack led to substantial portions of the internet going down. The complexity and interdependence of systems and networks will only increase in the future.”]

