Tag: authorization

  • From castles to cities — a modern approach to authorization [Q&A]

    Corporate information security has traditionally used the ‘castle’ approach, using a strong boundary to keep everything secure. But as we’ve moved to hybrid working and more sharing of information the castle is too restrictive and we’ve moved towards a ‘city’ model, allowing open routes to trade with assets widely distributed. How can enterprises cope with…