From securityboulevard.com
Security has always been a cat-and-mouse game. Hackers find a way to breach security. Security teams fix the holes and implement new controls. Then bad actors find a way to circumvent those new measures. Rinse and repeat.
The odds, unfortunately, are in the attackers’ favor. It’s not a matter of if but when the next data breach will occur. Even the NSA has proven unable to prevent attackers from gaining access to its potent tools and secrets.
Technology and security practices continue to evolve, with a considerable shift in strategic focus in recent years. Current thinking is that legacy perimeter security can no longer serve as the trusted means to foil attackers. Some even contend that legacy perimeter security no longer has validity at all—especially in the cloud.