Welcome!

John Walsh

Subscribe to John Walsh: eMailAlertsEmail Alerts
Get John Walsh via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by John Walsh

How Access Management Protects Today's No-Perimeter Network The rule of thumb for network security today is that there is no perimeter anymore. An outsider can easily become an insider once perimeter security is breached. Every day, attackers find new ways to breach enterprise perimeter security through ransomware, malware or phishing through social engineering. This is not to suggest that all is lost. Rather, organizations can defeat cybercriminals, in part, by better managing what has already been put in place. As an example of what can go wrong if that doesn't happen, consider the following story. On the way in to his office one day, Chris, the CSO of Big Deal Company, runs into Kate from cryptography, who comments that their IT admin, Tim, has been hard at work since about 5:00 a.m. This seems odd, since Tim is not known to be a morning person. Kate says Tim requ... (more)