Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep "bad" things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user. . . .
Most security solutions today are built around attempting to protect the vulnerability of the PC and, or the server, by attempting to keep "bad" things outside of the network security perimeter. But, with the changing and disappearing perimeter - security now needs to be intrinsic in every system and for every user.

With the changing and disappearing perimeter - the model must change from the black list approach of trying to exclude everything that may be harmful to your network, to a more proactive white list, allowing secure access from anywhere. As evidenced by today's security problems, black list approaches simply do not work!

The link for this article located at Bob Johnson is no longer available.