How Do You Protect Your Perimeter When You’ve Blown it to Pieces?

By Ian Kilpatrick, Executive Vice President Cyber-Security, Nuvias Group and Chairman Wick Hill Group
In 2016, we are subject to near constant headlines detailing the latest big data breach or hacking scandal. Many of us probably think we have a pretty good handle on the different types of security risks that can threaten our businesses. But the reality may be a little different.
The introduction of new technologies, the growth of cloud computing and changing employee working practices have