
Hamish Taylor
CFOonline TOLA
CFO Panel
The growth of insecure or unknown devices attaching to the network, along with the current climate of Covid-19 remote workers, is making it harder to distinguish between internal trusted users and external unknown untrusted users. Because networks now have numerous “edges,” it’s more difficult to create a single defensible boundary, rendering perimeter-based access control strategies ineffective. Consequently, businesses have had to rethink their current security strategy and adopt a zero-trust approach to network access with proactive protection. Now more then ever, organizations need to ensure that their networks are secure from the latest threats.