One of the most significant changes in the world of security today is the loss of the concept of a defensible network perimeter.
Many legacy security frameworks and concepts are built on the idea that we can keep threats out of the entire network where we store and transact information. The reality is that most of us now operate in a cat and mouse game of identifying and containing the latest intrusions and disruptions.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access