An article in Security Week notes that for many organizations, the network perimeter has been replaced with a variety of new network edges. Many have specific challenges that can severely complicate an organization’s ability to maintain a consistent and manageable security infrastructure. These security challenges are two-fold.