Today’s enterprise network is no longer restricted to within-the-perimeter. Instead, it stretches across multiple clouds all the way to end-user devices – such as remote PCs, mobile devices, and IoT devices – introducing multiple new threat vectors. This paper from Unisys outlines the role Identity and Access management (IAM) and IT Governance play in ensuring companies protect their networks from insider threats and hackers.
Jon Collins’ in-depth look at tech and society
Kathryn Cave looks at the big trends in tech