
A common topic I would like to call out which I see in regards to security has to do with endpoints. I kind of want to call those endpoints “potentially vulnerable attack vectors”. I am a bit nervous writing “vulnerable” because the endpoints I mention here are secure, which is why I also called out […]
Read More →





