Mimir Blog

Sharding to Contain the Blast Radius of Data Breaches

Modern SaaS platforms sit on top of massive, multi-tenant data stores. When those stores are breached, the damage is rarely limited to a single record; it is often “wholesale” compromise of large slices of the user base. For a CISO or CTO, this is the critical risk: not that a record can be stolen, but that everything a given system knows becomes available in one incident.

Read More »

When SaaS Fails, It Fails at Scale: Why Data-in-Use Protection Matters

Cloud and SaaS have become the default place to store and process sensitive data. They have also become the default place to lose it. Recent years have seen the same pattern repeat: a single weakness in a cloud platform, data-warehouse service, or widely used SaaS component is exploited once, and data for many organisations and millions of users moves at once. File-transfer vulnerabilities, data-warehouse credential campaigns, and third-party

Read More »

Protecting Data-In-Use in the Cloud: A Pragmatic Philosophy

Executive Summary: In modern cloud environments, protecting data-in-use (data actively processed in memory) is critical. If an adversary can read or dump your system’s memory, they can steal session tokens, encryption keys, or other credentials that let them impersonate legitimate users. In fact, infostealing malware that exfiltrates session cookies can “bypass password and 2FA controls” and give attackers access to victim accounts from their own devicescloud.google.com. Traditional defenses like encryption at

Read More »