The Future of Secure Access

  • Inconsistent security standards

    This relates to the earlier post of " The perimeter isn't what it used to be ", but it is an issue that is deserving of a bit more explanation. How many times have you seen this? Requirements for remote access: AV installed, firewall configured...
  • The perimeter isn't what it used to be

    For a long time, the focus in the security world has been on the network perimeter. Firewalls (of all kinds; its a very broad term now) and VPN's (that's a very broad term now, too) are big business. And they should be. The network perimeter is important...
  • You don't have a "private" network

    "Your" network is not yours. That's right. Not yours. It belongs to someone else. You don't have a "private" network. But before I continue with that, let me digress a bit. I want to start out the first posts of this blog with some foundation information...
  • The big three

    So thus far, we've talked about some background on the problems. I want to take this and focus is a bit on the main big areas that security items fall into. We've talked about: You don't have a private network The perimeter isn't what it used...
  • Data, data, data...

    Haven't updated the blog in a while. I was on a 10 day business trip to Israel. It was very productive, and I also had a ton of fun! But it got me behind on everything else. So, back to the blog... When we look at security, what we are looking at...
  • So what is this blog about?

    I titled this blog "The Future of Secure Access", and made the URL path "FutureSecurity". But do I really mean it? Am I really talking about " the future " of secure access? And what does that mean? First of all: You bet I mean it! What we are working...