Topics
Content Types
About 2 results
-
Hacker or user? How to tell friend from foe
With so many staff and customers operating outside the conventional firewall, firms are rethinking their controls and security - which is where the identity perimeter comes in.
-
IT security: How do you deal with the unknown-unknowns?
Security firms have become accomplished at spotting the known threats over the years, but stopping zero-day attacks takes something more.