Security expert John Sawyer: The network perimeter is dead, but it’s just changed. Malicious hackers took advantage of mobile devices and used them as jumping points into the corporate network. Location-aware host-based firewalls have stepped into help make managing the firewall on endpoints easier. Don’t assume that since it is within your corporate perimeter that it is safe. Be diligent in all aspects of protection, because each one is a backdoor into your network, he says. John H. Sawyer is a security geek on the IT Security Team at the University of Florida.”]
Source: https://www.darkreading.com/attacks-breaches/redefining-the-perimeter

