Meet your attackers on their own own turf

By on
Meet your attackers on their own own turf

There’s plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. Worm storms. Security toolkits with the latest intrusion detection tools. Secure software applications.

No argument here: all these complex perimeter challenges facing security professionals today are painfully real. And putting up your best defensive fight is entirely necessary. Organizations take huge steps to harden themselves at the perimeter. And the expression "defense in depth" remains a ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now
Copyright © SC Magazine, US edition

Most Read Articles

Log In

|  Forgot your password?