Blocking malicious traffic - an evolving problem
In the not too distant past, security teams used in-house firewalls to inspect all network traffic and block calls to malicious URLs. This worked well when most devices were connected to a controlled network. Security was all about having strong defenses at the network’s edges to block unauthorized access and keep an eye on threats. Then we used always-on VPNs to tunnel traffic from roaming devices through the corporate firewall. ...