harshit.cloud
ツ
Sénior SRE
Home
Blog
TIL
Tags
Graph
Toggle theme
Back to tags
#endpoint
1 blog post.
Blog posts
Lazy SRE's guide to secure systems, part 5: the dev laptop is the perimeter
Snowflake taught everyone what happens when an infostealer runs on a contractor's personal Mac. The laptop is the perimeter.
Related tags
#OPSEC
#ai
#ai-gateway
#ai-tooling
#akamai
#anime
#audit-logs
#automation
#endpoint