Cybersecurity used to be about preventing access to a hermetically sealed environment: the corporate network. Today, security must contend with a decentralized IT environment as employees access data in different applications, from different locations, and on different devices. The cybersecurity challenge has evolved from keeping data inside the network perimeter to preventing data leakage as it travels across access points.
Cloud is the grand enabler of this new way of work and the next generation of threats. Passwords are all too frequently the last (only) line of defense. Employees often reuse passwords between consumer and enterprise cloud applications, and the best phishing scams succeed nearly half the time.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access