Hardware Security, Zero trust

Legacy IT: The hidden problem of digital transformation

December 28, 2020
Companies may want to undertake digital transformation, but often start with legacy servers built in the early 2000s. Today’s columnist, Hemanta Swaim, formerly of TiVo, offers some insights on how to secure legacy IT systems. Jemimus CreativeCommons Attribution 2.0 Generic CC BY 2.0)
  • Identify legacy assets.
  • Segment everything.
  • Leverage identity management.
  • Trust no one without verifying.
prestitial ad