News
The Cyber Security ‘Perimeter:’ Has It Simply Vanished?
According to Cyber Security Hub, the concept of a cyber security perimeter intrigues security experts, who have long fought against emerging malware strains and external threats to fortify a network’s interior. Today, is a castle-and-moat strategy a thing of the past?
Addressing The Challenges of Moving Security to the Edge
An article in Security Week notes that for many organizations, the network perimeter has been replaced with a variety of new network edges. Many have specific challenges that can severely complicate an organization’s ability to maintain a consistent and manageable security infrastructure. These security challenges are two-fold.
New Year, New Technology: Law Firms Turning to Cloud Technology for Increased Data Security
“Law firms house a great deal of sensitive client information and are understandably concerned about the IT security of any technology solution they implement. However, many firms still think that legacy on-premise IT solutions are the most effective way to safeguard client data. The fact is that maintaining a secure on-premise IT solution is costly and complex,” according to Travis Howe, CISO of Litify.
- « Previous
- 1
- 2
- 3
- 4