Managing Mobile Security: Of Doves and De-Perimeterization – Forbes
Forbes |
Managing Mobile Security: Of Doves and De-Perimeterization
Forbes In the old days, security gurus treated IT almost like a castle, with a moat and high walls. Inside the castle, everyone was assumed to be safe; outside was danger. The castle walls were the firewalls of user authentication and network security. How To Fix The Gaping Holes In Mobile Security Mobile Devices, Services Not Widely Trusted: Juniper Mobile BYOD Users Want More Security |