Menu

Blogs

  • The New Security Boundaries and How to Protect Them

    by Peter Merkulov on September 23, 2016

    Leading image

    The traditional network perimeter is a relic—a vestige of a time before the advent of easy mobility. And security strategies that focus on traditional perimeter defense are a symptom of change resistance and of a fixation on the past rather than a vision for the future. Consider this; the latest Ericsson mobility report says that 90 percent of the world’s population over the age of six will own a smartphone by 2020. That’s a lot of devices in the hands of as many as 6.6 billion people. And as…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Tue, 27 Sep 2016 08:08:24 -0400.
© 2016 EMC Corporation. All rights reserved.