Today’s enterprise network is no longer restricted to within-the-perimeter. Instead, it stretches across multiple clouds all the way to end-user devices – such as remote PCs, mobile devices, and IoT devices – introducing multiple new threat vectors. This paper from Unisys outlines the role Identity and Access management (IAM) and IT Governance play in ensuring companies protect their networks from insider threats and hackers.
Mark Chillingworth on IT leadership
Phil Muncaster reports on China and beyond
Kathryn Cave looks at the big trends in tech