From: CIO
An ambitious government IT push toward cloud, mobile and shared services stokes concerns about security challenges from insider threats and disappearing network boundaries.
WASHINGTON – In an era of cloud computing, increasing mobility and federal agencies outsourcing more functions to IT contractors, the traditional lines delineating a network perimeter have blurred beyond recognition, experts warn.
“I think best practices have to completely shift,” Gus Hunt, operating partner at the private equity firm LLR Partners and the former CTO at the CIA, said this week at a government IT conference.
“We’ve entered into this world where there is no boundary,” Hunt says. “The approaches which have gone at this in the past – of trying to protect the perimeter – are the ones that are actually failing in this case, because the perimeter doesn’t exist and what constitutes an insider is also itself constantly changing.”
Leave a Reply