Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

They mention in the article that their zero-trust architecture is what prevented the attacker from gaining access to on-prem data. So it seemed like it worked pretty well in mitigating the damage.


I'm curious if they actually mean "Zero trust" in the "perimeterless" sense (https://en.wikipedia.org/wiki/Zero_trust_security_model) or if they just mean their on-prem solution doesn't require trusting some central service operated by Retool.


The latter




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: