Jan. 22, 2022, 3:55 a.m. | /u/columnarpad

cybersecurity www.reddit.com

I am trying to wrap my head around the ways an application can authenticate with a central service, to prove it is allowed to deliver information - At the same time, protecting this credential from users/sysadmins/attackers that would try to obtain it.

I'll use an RMM solution for an example:

There's a central server installed on a server accessible from the Internet, and a Software Agent installed on a managed endpoint at a customer. The RMM Central Server has a …

access application cybersecurity server

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Information Systems Security Officer (ISSO), Junior

@ Dark Wolf Solutions | Remote / Dark Wolf Locations

Cloud Security Engineer

@ ManTech | REMT - Remote Worker Location

SAP Security & GRC Consultant

@ NTT DATA | HYDERABAD, TG, IN

Security Engineer 2 - Adversary Simulation Operations

@ Datadog | New York City, USA