There's plenty of talk today about perimeter security strategies. Protecting the perimeter with multilayered security. Identifying the perimeter. The latest buzz on firewalls. Zero-day attacks. Worm storms. Security toolkits with the latest intrusion detection tools. Secure software applications. No argument here: all these complex perimeter challenges facing security professionals today are painfully real. And putting up your best defensive fight is entirely necessary. Organizations take huge steps to harden themselves at the perimeter. And the expression "defense in depth" remains a popular battle cry for many a security director.
展开▼