Identity and access management traces its roots back to the mainframe era. DoD first employed logical access controls...
Just-In-Time
Image credit: Unsplash In the previous blog post, we discussed how to protect against the compromise of highly...
Image credit: Unsplash Protecting highly privileged users is at the heart of security 2.0 stack. Easiest way to become...
Image credit: Unsplash We are a mid-sized startup and our code base is little over a million lines of code. If we...