Information security has, by necessity, changed a lot from a strategic perspective. From physical walls to encoded maps to locks and chains, the way we defend against the age-old criminal must evolve to support the ways we interact with data today.
Now, as we enter into an era of Security 3.0 that must grapple with new security challenges introduced by BYOD (Bring Your Own Device) and the cloud, what kind of security solution can we turn to in order to protect our private company data?
Stay tuned: The answer will be revealed April 14!
Duo’s Creative team has taken on the task of depicting security throughout the ages with a series of original illustrations. Here’s the second in our Evolution of Security series:
The Keys to the Gold Below
Pirates and thieves wisely sought the treasure map as the master keys to unlock an ancient fortune hidden deep underground or in remote caves - less obvious than a giant castle, and much more geographically obfuscated.
Armed with a treasure map, an explorer would have the keys to a chestful of gold - the location may be an X on the map, or coordinates indicating where to dig. Some treasure maps are puzzles, a series of encrypted messages that must be decoded for directions.
Buried treasure used to be protected by ambiguity and the earth...
Stay tuned to see the next phase of security evolution tomorrow!