Author: Prakash Linga

Take a close look at how most companies have approached information security, and you’ll notice a recurring theme. We’ve become experts at building castles, with towers, drawbridges, moats, sentries, and ever-more-complex locks. We secure our organizations like fortresses, building layers of walls around our networks, our applications, our storage containers, our identity, and our devices. This makes us feel safe. But then one email attachment accidentally leaves the citadel, forcing us to report a breach. An unhappy employee moves high-value designs onto a USB drive and takes it to a competitor. And just like that, the walls crumble. They fail…

Read More