Mimir Blog

Protecting Data-In-Use in the Cloud: A Pragmatic Philosophy

Executive Summary: In modern cloud environments, protecting data-in-use (data actively processed in memory) is critical. If an adversary can read or dump your system’s memory, they can steal session tokens, encryption keys, or other credentials that let them impersonate legitimate users. In fact, infostealing malware that exfiltrates session cookies can “bypass password and 2FA controls” and give attackers access to victim accounts from their own devicescloud.google.com. Traditional defenses like encryption at

Read More »