The best way to deal with morphing attack surfaces is to implement what the military calls “defense-in-depth,” where multiple security layers protect digital assets.
Barely a week passes without news of another high-profile security breach. That makes embracing a broadened IT perimeter seem risky, but it’s not as perilous as it might seem. If you are properly informed and do your homework, you can make a confident decision.
Major League Baseball has been pitched a curve ball with the allegations that St. Louis Cardinals’ front office personnel illegally hacked into the Houston Astros’ databases.