Taking Security With You in the WFH Era: What to Do Next

Mobile devices, bring-your-own-device policies, traveling employees, and remote contractors and partners have been stretching the security perimeter for the last decade. Still, using VPNs, access control, strong authentication, and other technologies, primary devices and network activity remained in IT’s control by being effectively tethered to on-premises systems and continuously monitored within the confines of the extended corporate network.

Read full article on Dark Reading: Cloud

 


Date:

Categorie(s):

Tag(s):