Connected Devices, Remote Security: Data Encryption and Security in the Cloud
By Pete Johnson
Security” used to mean worrying about HTTPS certificates on your websites. The notion of a “device” was a browser and all you really had to do was to guarantee that traffic between it and your web servers was encrypted.
Then the “bring your own device” (BYOD) phenomenon caused system administrators to worry about things like isolating WiFi traffic for visitors and providing VPN tunneling software of iOS and Android, so that employees could access corporate assets in the palms of their hands. “Device” then meant “smartphone.”