#perimeter-security

[ follow ]
Information security
fromSecuritymagazine
10 hours ago

From the Outside In: A Smarter Approach to Vendor Access

Organizations should shift from employee-centric access control to perimeter-focused security strategies to better manage risks from external vendors, contractors, and temporary workers.
fromSecuritymagazine
3 months ago

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

When thieves stole more than $80 million in jewels from the Louvre in Paris, they didn't exploit a total absence of security but rather gaps in the museum's broader security program, encompassing both aging systems and situational awareness, according to early reports. The museum's director later confirmed that the balcony used in the break-in wasn't covered by a functioning external camera; the only camera nearby faced the wrong direction.
Information security
fromHackernoon
6 years ago

Forget Perimeters: Here's How Context Is Redefining Cloud Security | HackerNoon

The 'castle and moat' idea has gone from outdated to outright dangerous as applications and users have scattered across public clouds, SaaS platforms, and more.
Privacy professionals
[ Load more ]