How to stay open and secure

By on

It’s a maxim that applies as much to network security as it does to protecting physical assets because there are many ways for a determined individual to penetrate a perimeter defense. Some threats like the Sobig virus instantly threatened networks through email attachments while T-Mobile’s customer data was hacked over a period of many months as reported in SC Magazine here.

Firewalls have a rightful place in network security, but they can no longer be as rigid as they have in the past. Firewalls are good at stopping certain threats, but they can't determine an anomaly in a packet's protocols and decide to block it. Also, a perimeter defense has to take into ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?