![]() |
In my last blog I talked about the key technologies breaking down our doors in 2013. The four key areas were Cloud Computing, Social Media, Big Data and Mobile Devices. None of these should have come as a surprise to anyone in the industry today. These are all topics that are discussed and debated around tables of security teams in most enterprises. So, what can we do today to ensure we are prepared for these challenges and how do we start reinforcing our doors so that we allow these new technologies but have greater control and visibility and provide transparency for the user? There are three gaps that will help with this reinforcement. Addressing these gaps will require organizations to act now!
Look out for my next blog on Action Plans for each of the four disruptive technologies. |
Update your feed preferences |
