Get a Pentest and security assessment of your IT network.

News

Redefining the Perimeter

Security expert John Sawyer: The network perimeter is dead, but it’s just changed. Malicious hackers took advantage of mobile devices and used them as jumping points into the corporate network. Location-aware host-based firewalls have stepped into help make managing the firewall on endpoints easier. Don’t assume that since it is within your corporate perimeter that it is safe. Be diligent in all aspects of protection, because each one is a backdoor into your network, he says. John H. Sawyer is a security geek on the IT Security Team at the University of Florida.”]

Source: https://www.darkreading.com/attacks-breaches/redefining-the-perimeter

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

RasGas, The Second Victim!

News

Technical analysis of the Locker virus on mobile phones