Cybersecurity Question of the Month: April

Posted by Fuel HQ on May 15, 2017 8:00:00 AM

Each month, we ask Fuel members to weign in with their opinions on the Cybersecurity Question of the Month, and we’re sharing their answers here.
 
Phil De Meyer, a senior network administrator, and Paul Carter, an information security engineer, are members of Fuel’s Editorial Subcommittee under the Community Development Council. Paul and Phil shared their thoughts on the most recent Cybersecurity Question of the Month.
 
In the past, an IT perimeter for network security could be more easily defined and contained. Now, there are numerous devices that break traditional perimeter security including: applications that traverse through firewall policies; mobile devices; IP-enabled devices internal to the network; external devices that are allowed on the internal network 'temporarily;' wireless access points that are unknowingly deployed; and direct internet access from devices.
 
What are the limits of a ‘perimeter-oriented’ security posture? What approaches do you take to keep ever-changing networks secure?
Read More

Topics: Cybersecurity, Hot Topic, threat prevention, threat intelligence, perimeter, cybersecurity question of the month

Posts by Topic

see all

Subscribe to Blog Updates

Recent Posts

Posts by Topic

see all