Why do we need a risk-based approach to authentication?

fence-901x551

20 years ago, everyone worked at a desktop workstation hardwired into an office building. This made network security simple and organizations felt they could depend on the time-tested method of the trusted perimeter. Firewalls were relied on to keep out external threats, and anything within the network was considered secure and safe.

Click here to view original webpage at www.helpnetsecurity.com

Categories:

Your e-mail address will not be published.
Required fields are marked*