Update from the Standards Vice President Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.5594/jmi.2020.3046907
· OA: W4210252757
<fig orientation="portrait" position="float" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <graphic orientation="portrait" position="float" xlink:href="devli-3046907.tif"/> </fig> We are Now Cloud-First was the opening phrase from my last <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Journal</i> piece. This is particularly important when considering workflows and security. The security industry has been changing its methodologies. Techniques such as firewalls, perimeter security, and malware signature detection are still vital and needed, but there is an increasing understanding that this is not enough. Newer methodologies such as Zero Trust seek to bring security to the front of the equipment, system, and facility design cycle.