Information networks are staged for tectonic changes in 2013. Users and endpoint devices are proliferating across a range of platforms and OSs. Network resources are being virtualized. And the threats to systems and data are becoming more sophisticated and pervasive. Find out what all this means for IT security technologies and techniques and what you can do to stay ahead of the game.
↧