New ICT infrastructure requires new security paradigm
The title of this post may appear trivial but….. I know many security “expert”, coming from the classic security architecture based on physical security, physical perimeter protection (firewalls, IPS/IDS, etc.) which continue to belive that only well defined boundary between security zones (LAN, DMZ, WAN, etc.) can protect your environment. The purpose of this post is to introduce some ideas ab...
The title of this post may appear trivial but….. I know many security “expert”, coming from the classic security architecture based on physical security, physical perimeter protection (firewalls, IPS/IDS, etc.) which continue to belive that only well defined boundary between security zones (LAN, ...