Are you still using the “tootsie pop” model for network security?

We’ve been hearing for a decade that the firewall is dead, that perimeter security doesn’t matter anymore, that we live in an era of networks without borders. But how many organizations have really taken it to heart? A surprising number still rely on the tootsie pop approach to security – and it’s catching up with them.

Read more here:
http://www.scmagazine.com/why-its-time-to-replace-the-tootsie-pop-approach-to-network-security/article/404779/

Leave a Comment

Your email address will not be published.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Scroll to Top