Segmentation: The Neglected (Yet Essential) Control

Throughout the past decade, the information security profession has pursued an approach centered around protecting the network perimeter. While this proactive strategy has become the foundation of most enterprise programs, organizations must be equally capable of reacting to attacks by containing intruders once they have entered the network.

Read full news article on Dark Reading

 


Date:

Categorie(s):