The search for the perimeter in cloud security, and the debate over whether there should actually be such a thing in that endeavor, leaves several open questions, all of which testify to the fact that we’re not ready for prime time with this. Here are just three:
Read more