10 ways to protect yourself with 'pragmatic network security'
In the increasingly federated, network-based IT environment, perimeter security is important but not sufficient by itself to protect a company's secrets, warns Mike Rothman, president and principal analyst of Security Incite and former Meta Group Inc. security analyst.
Firewalls, demilitarized zones and similar boundary security technologies and methodologies certainly are still important for protecting your network from Internet-based attacks.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.