Pinpointing the blast radius post-cyberattack is tougher than ever. What we need is attribute-based access.
Go Here to Read this Fast! Lessons in cybersecurity from the Internet Archive Breaches
Originally appeared here:
Lessons in cybersecurity from the Internet Archive Breaches