According to Cyber Security Hub, the concept of a cyber security perimeter intrigues security experts, who have long fought against emerging malware strains and external threats to fortify a network’s interior. Today, is a castle-and-moat strategy a thing of the past?
An article in Security Week notes that for many organizations, the network perimeter has been replaced with a variety of new network edges. Many have specific challenges that can severely complicate an organization’s ability to maintain a consistent and manageable security infrastructure. These security challenges are two-fold.
“Law firms house a great deal of sensitive client information and are understandably concerned about the IT security of any technology solution they implement. However, many firms still think that legacy on-premise IT solutions are the most effective way to safeguard client data. The fact is that maintaining a secure on-premise IT solution is costly and complex,” according to Travis Howe, CISO of Litify.