1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Building bridges in a fractured security ecosystem

Discussion in 'CSO' started by RSS, Dec 7, 2015.

  1. RSS

    RSS New Member Member

    Because legacy systems are required and often critical to the daily operations of an enterprise, many companies are still using operating systems or applications that cannot be patched.

    Developers are building applications with features in mind but security is usually an afterthought. The rush to publish applications surpasses the need to develop more secure software resulting in a fractured security ecosystem. As developers and defenders continue to learn how to work together, applications will become more secure.

    In a Forrester Research report, “Transform Your Security Architecture And Operations For The Zero Trust Ecosystem,” Rick Holland, vice president and principal analyst wrote, “Legacy, perimeter-centric approaches to security are ineffectual for today’s digital business. S&R pros need a new approach, and that approach is the Zero Trust Model of information security.”

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page