Thursday, January 19, 2017

R-Evolution: The Evolution of Risk

Ten years ago, when a user needed to access a corporate application, his or her usage was on a company-owned device and typically confined to company-owned networks. These applications were nicely tucked behind corporate firewalls, and managed by dedicated IT organizations. To identify themselves, users would often enter complex, lengthy passwords when accessing such resources,…

The post R-Evolution: The Evolution of Risk appeared first on Speaking of Security - The RSA Blog.



from R-Evolution: The Evolution of Risk

No comments:

Post a Comment