From the Enterprise Perimeter to a Mobility-Enabled Secure Cloud
IEEE Security & Privacy
By Edward G. Amoroso
Issue Date:January 2013
The enterprise perimeter has exhibited gradual trust degradation owing to a succession of connectivity decisions involving Web, email, virtual private networking, exceptions, and mobile networks as well as a succession of threats including malware and adva...