At literally the last minute, I moderated an endpoint security panel today. One of the issues brought up by an audience member was "personal IT" – a clever name for the gadgets undergoing the consumerization of technology being brought in from home.
The personal IT devices at this stage are so popular that we all need to consider how to leverage these platforms for authoritative credentials and secure data stores. First, we'll need to re-industrialize them, then harden them, then slowly realize that the laptop or whatever larger client is in use can be made more secure through the use of these personal IT devices.