1 INTRODUCTION

The ways businesses and people use technology today have created a state of paradox. Companies are trying to protect their core information assets and intellectual property while using externally hosted services, collaborating with partners and adopting agile, ‘fail fast’ approaches to business;1 employees are using their own devices and exchanging corporate data via social tools; consumers are looking for more privacy at the same time as sometimes being accused of over-sharing.

As a result it has become difficult, if not impossible, to identify the boundaries of what was once termed ‘corporate IT’. Today’s technology environments need to encompass in-house data centres and cloud service providers, home desktops and facilities ...

Get Security Architect now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.