fuzzy sweater bondage In times when Cloud Computing, Internet of Things, mobile devices (including environments BYOD) are an increasingly widespread reality (and unstoppable future), thereby opening backdoors to our corporate network (and their respective threats), which place touches the IT security officer to manage an increasingly large number of hits and risks? Where is our corporate perimeter?
http://goidgracing.com/comics-spanked Block accesses can talk or we have only to settle for being resilient to attacks due to a lack of control visibility and access control?
see url Many doubts are raised, the market has responded and there are technological and non-technological solutions that seek to remedy the growing risk are suffering the organizations with new access technologies and cloud storage finally have access to our network.
source link I created a presentation where I explain in details this topic, you can see my presentation here (in Spanish):