-
Security solutions based on physical infrastructure, and policy expressed in terms of a particular device, the corporate PC, an IP address, network port, or application protocol are becoming useless in a mobile, borderless world.
FORBES: Going Mobile: Security in the Age of Ubiquity
-
In this case, the cyber identity of this file would be a full set of its cyber coordinates in the IP subspace: the computer IP address, its MAC address, a Port number associated with the particular application, and the file name would constitute the full set of cyber coordinates, singularly identifying a cyber object (our file) in cyberspace.
FORBES: Cyber Security Fails As 3.6 Million Social Security Numbers Breached In South Carolina
-
The printer was at IP address 192.168.1.103, but the port definition was for 192.168.1.102.
FORBES: With Rise Of Consumer Mobile Devices, We're All CIOs Now