Security leaders know their old perimeter-based security models are insufficient. But what new model is best? And how can it reduce reliance on passwords for authentication? Julian Lovelock of HID Global offers insight.
Distributed-denial-of-service attacks are not new, but they are being taken more seriously as a threat to network security and data protection, especially by financial-services, says Ashley Stephenson of Corero Network Security.
Because managing identities is a global problem, it requires a global solution, says Paul Simmonds of the Jericho Forum. A new organization has been established to address global identity. Simmonds offers insight.
We've seen user-driven trends such as BYOD before, says Kevin Flynn of Fortinet. And if organizations remember past security lessons, they will avoid falling prey to mistakes that could lead to breaches.
"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.