For insight into the hidden threats that forgotten machine identities can pose, check Paul’s blog “ Machine Identity Wars, Episode IX – The Rise of Skywalker.” Machine credentialing Here, I focus on the last line of defense needed to securely produce credentials and sign code. In this blog, and in an accompanying one by Paul Cleary from our technology partner Venafi, we explore the growing importance of machine credentials to thwart cyber-attacks. Illegitimate applications and devices can infiltrate organizations and cause severe damage. Ensuring one can account for the legitimacy of deployed machines is vital. Today in the real world, organizations deploy more and more machines including applications and physical devices to conduct critical business operations. In Episode VIII of Star Wars – The Last Jedi, the First Order uses a device to track the Resistance across hyperspace to execute a surprise attack.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |