Thursday, 6 August 2020

Authentication vs. authorization | Why we need authorization standards and what it means for enterprise cybersecurity

Twenty years ago, almost everything in the IT world was on-premises: hardware and software, including the tools you used to verify who your users were and what they could do in your systems. In today’s cloud-native world, almost nothing is on-prem, and because of the explosion of apps, remote users and devices, it has become a considerably more complicated task, by orders of magnitude, to verify the identity of a user — or a service — and determine policies that say what they are and aren’t allowed to do.

from Cyber Security News https://ift.tt/30Bahtc

No comments:

Post a Comment