TechRepublic: Hacker or user? How to tell friend from foe

If you are receptive to the ideas of the Jericho Forum security thinktank, then you may well accept its view that organisations can no longer rely on the firewalls that used to mark the extent of their control over IT infrastructure. Of course, in most cases the firewalls are still there. But they have had to become increasingly porous as more and more of the legitimate access to IT applications takes place from beyond their limits. Furthermore, with the increasing use of software as a service (SaaS), many of the applications are themselves beyond the firewall.