Seth Adler | 11/04/2020
As discussed in CISO Strategies for Incident Response, the cloud has expanded the perimeter exponentially. As the perimeter is now infinite, data and the user take the focus of security from old HQ endpoints. But that infinite perimeter also brings in new endpoints- IoT devices- further complicating matters. If everything from a human to a vending machine is technology that can be attacked, the posture of the enterprise has to adapt.
Mohamad Mahjoub knows this all to well. As the CISO, Mi...
To continue reading this story Click Here
RECOMMENDED
6 skills modern CISOs must have
2023-12-13
The top 25 leaders in cyber security 2024
2023-10-19
Upcoming Events
Digital Identity Week
09 - 10 September, 2025
Sydney, Australia
Register Now |
View Agenda |
Learn More