As recently as three years ago, if you asked IT executives to describe their information security strategies, youd get an earful about "perimeter hardening" (carefully firewalling all points of the network connected to third parties). The idea was that if you locked down access to your network, you'd automatically protect applications, data and resources.
展开▼