Blogs

  • New Threats, New Requirements: Time to Update Your Information Security Policies

    by John Linkous on April 15, 2014

    Leading image

    In the rapid scale of technology time, it's safe to say that we're no longer living in the world of your father's Internet. Of course, this has ramifications for Internet security: The rapid adoption of the mobile device as the primary interface for many users, the mass-scale outsourcing of infrastructure, services, and data to cloud providers, and the now-ubiquitous "Internet of Things" that forces a fundamental shift in how we think about connected devices all present new and different…

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 17 Apr 2014 05:35:30 -0400.
© 2014 EMC Corporation. All rights reserved.