Beware Using Internal Encryption as an IT Security Blanket

It certainly sounds reasonable: networks are moving toward a perimeter-less model so the line between internal and external network is blurring. The introduction of cloud computing as overdraft prote...
Published May 28, 2009
Version 1.0