{"title":"安全且有弹性的远程访问才是真正重要的","authors":"Alan Stewart-Brown","doi":"10.12968/s1353-4858(23)70015-9","DOIUrl":null,"url":null,"abstract":"Forget the ‘edge vs cloud’ debate. These technologies each have their place, but they are both vulnerable to certain kinds of threats. And it is these risks that should be front of mind – especially for organisations adapting to new kinds of working.","PeriodicalId":100949,"journal":{"name":"Network Security","volume":"102 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure and resilient remote access is what really matters\",\"authors\":\"Alan Stewart-Brown\",\"doi\":\"10.12968/s1353-4858(23)70015-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Forget the ‘edge vs cloud’ debate. These technologies each have their place, but they are both vulnerable to certain kinds of threats. And it is these risks that should be front of mind – especially for organisations adapting to new kinds of working.\",\"PeriodicalId\":100949,\"journal\":{\"name\":\"Network Security\",\"volume\":\"102 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Network Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1353-4858(23)70015-9\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1353-4858(23)70015-9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Secure and resilient remote access is what really matters
Forget the ‘edge vs cloud’ debate. These technologies each have their place, but they are both vulnerable to certain kinds of threats. And it is these risks that should be front of mind – especially for organisations adapting to new kinds of working.