By Matt Jones | June 17, 2021 | 0 Comment
In the course of writing software or security policies, we often need to specifically allow some items or exclude other items. For years, most software development teams have referred to these as “whitelists” and “blacklists.” Examples include only allowing (whitelist) or blocking (blacklist) traffic from a set of known IP addresses. In recent years, software […]
Continue ReadingBy user | | 0 Comment
In the course of writing software or security policies, we often need to specifically allow some items or exclude other items. For years, most software development teams have referred to these as “whitelists” and “blacklists.” Examples include only allowing (whitelist) or blocking (blacklist) traffic from a set of known IP addresses. In recent years, software […]
Continue Reading