Page 35 - GCN, Feb/Mar 2018
P. 35

 ber
         Protecting the perimeter is no longer enough. So what are the tools for tomorrow’s security?
BY PATRICK MARSHALL
For IT managers at government agencies, it might
seem like a perfect storm is gathering: tight budgets and demands to upgrade aging network infrastructure; mandates to move applications into the cloud and beyond their traditional network security perimeter; calls to support rapidly growing numbers of users
on mobile devices; and, above all, warnings from intelligence agencies to expect ever greater cyberthreats.
“We are constantly figuring out how to whack the next mole and beat the bad guys at the next level of
the game,” said Susannah Schiller, deputy CIO at the National Institute of Standards and Technology. “It is a constantly evolving thing, and it has been getting worse every year.”
GCN FEBRUARY/MARCH 2018 • GCN.COM 35
                                y

























































































   33   34   35   36   37