{"id":2089,"date":"2005-04-08T00:00:00","date_gmt":"2005-04-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/04\/08\/the-future-of-it-security-is-fewer-walls-not-more\/"},"modified":"2021-12-30T11:40:38","modified_gmt":"2021-12-30T11:40:38","slug":"the-future-of-it-security-is-fewer-walls-not-more","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/04\/08\/the-future-of-it-security-is-fewer-walls-not-more\/","title":{"rendered":"The future of IT security is fewer walls, not more"},"content":{"rendered":"<p>Firewalls supposedly repel invaders &#8212; apart from those that get through the necessary holes and into the constantly compromised software behind.  The inconvenience of shoring up security infrastructures is restricting the evolution of the extended business.  Something needs to change and the UK security user group the Jericho Forum believes it has the answer.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A roving gang of European chief information security officers claims the key to better security is less walls not more &#8212; a concept they call deperimeterisation.<\/p>\n<p>Security is a process not a product, says Jericho.   Establish open standards for identity management, digital rights, encryption and data-level authentication, and we can eventually do away with the rest of the security infrastructure altogether while maintaining commercial and operational flexibility. But because the Jericho Forum is user-led, it is honest about the problems and pragmatic about a gradual introduction of these ideas.<\/p>\n<p>ZDNet UK spoke to one of Jericho&#8217;s founders, Paul Simmonds, global information security director of chemical giant ICI, about the ideas behind deperimeterisation and pushing the organisations unique take on security to the US.<\/p>\n<p>http:\/\/insight.zdnet.co.uk\/internet\/security\/0,39020457,39194164,00.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2089","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2089","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2089"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2089\/revisions"}],"predecessor-version":[{"id":4576,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2089\/revisions\/4576"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2089"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2089"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2089"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}