Which one of these actions is the best way to resolve security challenges in borderless
networks?
A.
Upgrade all existing security products in the network.
B.
Identify the vulnerabilities of only newly deployed services.
C.
Identify the vulnerabilities of only newly deployed network devices.
D.
Migrate to an architectural approach to security.