More than Half of RSA Attendees to Increase Mobile Cybersecurity Investment
“Mobility, SaaS and cloud computing are enabling end users to access corporate data from any device and any location, rendering traditional perimeter security ineffective,” said Santosh Krishnan, Chief Product Officer, Lookout. “So it is not surprising that, in this post-perimeter era, an overwhelming majority of respondents have accessed corporate data from personal mobile devices or through public WiFi networks. This is concerning, as attacks, like phishing, have evolved to take advantage of the fact that existing perimeter protections no longer have visibility into user traffic. Enterprises need to adopt a post-perimeter security architecture to secure access to their corporate data.”