Identity is the New OS: Rethinking Security Boundaries in the Cloud
In traditional infrastructure, the operating system was the security boundary.
A geeky blog about technical things
In traditional infrastructure, the operating system was the security boundary.
Cloud object storage introduces a subtle but critical challenge for File Integrity Monitoring (FIM): there is no “file system” in the traditional sense. But that doesn't mean you shouldn't be monitoring it (given it's even more exposed than your on-premise architecture in many c…