Foiling hackers with a virtual perimeter

By on
Foiling hackers with a virtual perimeter

[Blog post] Security defined perimeters show promise.

Another week, another story about a massive data leak. Bankers JPMorgan Chase had to fess up to a staggering 83 million account holders having had their information leached by… who knows? Some unknown, unauthorised individuals were able to exploit subtle weaknesses in security systems ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Tags:
Juha Saarinen
Juha Saarinen has been covering the technology sector since the mid-1990s for publications around the world. He has been writing for iTnews since 2010 and also contributes to the New Zealand Herald, the Guardian and Wired's Threat Level section. He is based in Auckland, New Zealand. Google
Read more from this blog: SigInt

Most Read Articles

Log In

Username:
Password:
|  Forgot your password?