
The Cybersecurity Playbook for Modern Enterprises
By :

Traditional security models often are techno-centric and do not use the security triumvirates discussed previously. Instead, they focus on the technology used and therefore are vulnerable to change. With the current pace of change in the technology landscape, the shelf life of a techno-centric model is shorter than at any previous time in history. It is said that technological change is a flywheel, and we are likely to see a perpetually accelerating pace of change. As a result, techno-centric models don't work.
For decades, there has been a pendulum of trends in information technology swinging between centralized and decentralized infrastructures. Mainframes with terminals were a centralized architecture. All the computing power was in the mainframe, and the terminal was used only to access the mainframe. With the advent of personal computers and laptops, processing power was increasingly decentralized. The cloud computing...
Change the font size
Change margin width
Change background colour