The most secure information is information that no one can access. The most useful information is information that anyone can access, so there are more brains applied to it. That's the conundrum of our connected technology today.
Both the Internet of things and liquid computing increase the connectivity of data to devices, making complete auditing and assurance perhaps impossible. Already, IT departments routinely freak out about cloud storage and mobile device use. Wait till their users bring in this new stuff!
Perhaps worse for IT, the leading providers in liquid computing and Internet of things are not typically your existing IT providers. Apple, Google, and a bunch of startups figure largely in these connected technologies, not so much Microsoft, SAP, Oracle, EMC, and so on.
It's not only devices but the protocols; Apple's Bonjour handshaking protocols, for example, aren't available for Android devices, and its Handoff APIs aren't available for Windows, Android, Chrome OS, or anything non-Apple.
Even traditional providers like IBM who are making a play for these technologies are doing so mostly in a proprietary, locked-in manner. That's common in enterprise IT, where companies routinely describe themselves as an X shop, where X is their lead vendor. The real issue is that the leading providers in these new connected-computing approaches likely aren't the ones you've built your systems around.
Whether you change your technology portfolio or forgo new capabilities from new providers, there's a real price to pay -- consider the ROI and risk cost.