A question that has been lingering. It’s fair game, but before I get around to actually answering, let’s remember how we got here. Late 90’s Before
Author: Shawn McKinney
Systems architect, security guy, open-source advocate and avid cyclist.
Using Roles for Access Control is not RBAC
I hear this kind of statement all the time: ‘We use Roles/Groups for access control in our systems and applications so we’re RBAC’. My response
Year of the Hack
2014 will be remembered as the Year of the hack. Sony, Target, Home Depot, UPS, even Victoria couldn’t keep herself Secret. The list of breaches is