Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Security pros say their companies invest in the wrong technologies

John P. Mello Jr. | Feb. 14, 2013
Almost two-thirds of those surveyed by SafeNet said they expect to suffer a data breach in the next three years

Not everyone agrees with Gonen's analysis. "Better perimeter solutions are needed that are effective and workable," George Tubin, a senior security strategist with Trusteer, a Boston-based cyber security company said in an interview.

"That's the direction we need to go instead of throwing up our hands and saying, 'Let's figure out what to do after the breaches happen because we can't stop them,'" he said.

The new perimeter is made up of the endpoints of the network, he added. "That's where the battleground is," he said. "You have to beat the criminals there and not allow them to compromise that device."

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.