Advisor

The Defense Against Cybercrime

Posted November 20, 2014 in Business Technology & Digital Transformation Strategies

Not long ago, it was possible to sequester the enterprise behind its firewall and DMZ, creating a clear and defensible boundary. But mobility, cloud technologies, and social networking are eroding this separation. 

About The Author
Brian Dooley
Brian J. Dooley is a Senior Consultant with Cutter Consortium's Data Analytics & Digital Technologies practice. He is an author, analyst, and journalist with more than 30 years' experience in analyzing and writing about IT trends. Mr. Dooley has written seven books, numerous user manuals, hundreds of reports, and more than 2,000 magazine features. He is the founder and past President of the New Zealand Chapter of the Society for Technical… Read More
Not a member? Gain Access to the Cutter Experts today — register now to read select open-access articles.