This article is both painfully true and somewhat depressing. That said, this problem needs to see the light of day. IT Security strategies must evolve away from a perimeter defense mindset and move more aggressively toward an actively monitored defense in depth methodology. There are many good continuous view options available for most security layers that IT shops should be considering and pursuing. Diligence is key!
top of page
Recent Posts
See AllI recently spoke about the FTC’s lawsuit against Chegg, a major education tech firm, in one of the weekly tech tips interviews I provide...
Multiple sources have reported the breach of Cisco’s own network, purportedly via a Cisco employee’s personal Google account. According...
I very much enjoyed this article from Pieter Danhieux via Dark Reading and this creative approach to the management of applications and...
bottom of page