In today’s security environment, can we truly define ‘trusted’ and ‘untrusted’ devices, networks or users? What we are hearing from manufacturers, industry analysts and customers is a resounding NO. The security community is responding by ...