In the cybersecurity world, “default deny, allow by exception” is almost a golden rule. If you follow it through in your system architecture, boundaries, software stack, you are building towards a “least” functionality that means A) you know what is going on in your environment and B) you have approved it to be in your […]