I stumbled on a seemingly unique requirement this week to log file access for a Windows network share. Of importance, was the logging of object deletions, […]
wired.com posted an article moments ago with a funny little flaw, allowing you to bypass the “lock code” configured on an iPhone. The discovery by some […]
If you’re building “secure” cloud solutions, you MUST be deploying infrastructure as code (Azure ARM / AWS CloudFormation / Terraform). If you’re not, why not? What […]