Reducing the risks of remote work starts with updating the access policies of yesterday. This is the biggest and most crucial effort, and the first step involves throwing away the old perimeter-focused access model and adopting a user-centric approach.
Read full article on Threat Post