Training to nullify the insider threat

By on
Training to nullify the insider threat

In the last decade, the security of your information on your networks has been focused on protecting the integrity of data from outsiders. Much of the effort has been based on perimeter security - from outsiders trying to break into the network.

In the days of static information, hardening the outside of the corporation was a great approach. But a static boundary is not the reality that we work in today. There is no one physical place that people always work. Today, the perimeter is porous. The job of the IT department has been to ...

Hi! You've reached one of our premium articles. This is available exclusively to subscribers.

It's free to register, and only takes a few minutes.

Once you sign up you'll have unlimited access to the full catalogue of Australia's best business IT content, as well as a daily news bulletin delivered straight to your inbox.

Register now

Most Read Articles

Log In

|  Forgot your password?