{"id":45,"date":"2004-02-04T00:00:00","date_gmt":"2004-02-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/04\/the-world-is-your-perimeter-finally-they-realize-it\/"},"modified":"2021-12-30T11:36:22","modified_gmt":"2021-12-30T11:36:22","slug":"the-world-is-your-perimeter-finally-they-realize-it","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/04\/the-world-is-your-perimeter-finally-they-realize-it\/","title":{"rendered":"The World Is Your Perimeter (Finally they realize it)"},"content":{"rendered":"<p>The castle-and-moat era of information security is over: Now it&#8217;s described as woven cloth, submarines, onions and Snickers bars.  How will CISOs translate nutty metaphors into secure worldwide systems?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CISOs have spent the past few years perfecting digging moats around the corporate castle.  Now, as they lift their heads out of the trenches, they find themselves living in the age of bomber planes and guided missiles.  <\/p>\n<p>The problems with perimeter-based security are neither new nor unclear.  Corporate information systems increasingly rely on tools and processes that exist outside the protective embrace of the traditional firewall.  Wireless, mobile, remote and ad hoc are the watchwords of today&#8217;s business, with employees, partners and customers often using two or three different devices&#8212;ranging from laptops to cell phones to kiosks at the local Internet caf<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-45","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/45","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/45\/revisions"}],"predecessor-version":[{"id":2532,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/45\/revisions\/2532"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=45"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=45"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}