![]() Instead of relying on a secure perimeter, each node should be its own island of security with proper authentication and permission checks happening at each step along the way. I've witnessed this happen several times working for companies that that should have known better, like IBM. Then when an external influence leaks in, as always eventually happens, it runs rampant and unchecked. ![]() Many of the more expensive network security disasters in IT have come from the assumption that "behind the firewall" everything is safe. If security is important to you, then you should, as a rule, assume that ALL networks are insecure. I realize that this isn't what you're asking, but it's important enough that I decided to write it anyway:
0 Comments
Leave a Reply. |