Authorization has come along way since setting bits in the file system. With the advancements in machine learning, big data, and behavioral profiling, it’s time for authorization to take its next generational leap and move into a flexible, risk-based access control...
Security management has historically been focused on the user attempting to access a resource. But in the increasingly complex world of CI/CD methodologies and microservices, it’s no longer “Users” and “Resources” we need to secure. Applications need to talk to each...
Recent Comments