It's Finally Time to Embrace Trusted Computing
Does your corporate network treat users on VPNs as trusted regardless of who they are? Does your web server connect to its database as a fictitious user with a password in a config file somewhere? Or perhaps the most frightening scenario: did your platform engineer log in as root to configure your CI/CD pipeline toolchain? These three situations are all examples of anonymous users – someone taking action somewhere on your network or in one of your cloud accounts without identifying themselves.