As both personal and corporate data and applications move to the cloud and mobile devices, the saying “trust but verify” takes on new meaning. It captures the practical reality of a world in which so many of our interactions occur online. More than ever, we need mechanisms to verify the identity of the entities with whom we interact.
Safeguarding of business applications is paramount no matter what the industry. But while many companies are focused on threats from outside of the organization, threats from within — whether intentional or accidental — cannot be ignored.
I recently met with the CEO of a large company who had suffered a network security breach. He asked the question, why did this happen and why didn’t my Information Systems people prevent the attack? My answer was simple. As the CEO, you drive your business to have network connectivity and availability. Security is something that always seems to get in the way and only becomes a priority when something bad happens.