For a long time the focus on network protection was on the outside. The idea was that given enough data about threat types and patterns and feeding that to security devices at the perimeter would mean that the bad guys get stopped at the network’s door.
Now we’re finding that the majority of our networks were breached long ago and they likely house the malware and communications paths that will eventually lead to successful compromise and theft of data. It’s time to take a long hard look inside our networks and understand where these bad actors have a footprint.
Leave a reply