For a long time the focus on network protection was on the outside. The idea was that given enough data about threat types and patterns and feeding that to security devices at the perimeter would mean that the bad guys get stopped at the network’s door. Now we’re finding that the majority of our networks […]
Latest Comments