Introduction
Introduction Statistics Contact Development Disclaimer Help
Post Ax93OykdFEIe4KiI5Y by [email protected]
More posts by [email protected]
Post #Ax8YSdggP5rBJv8Dq4 by [email protected]
0 likes, 0 repeats
If you are in a large org, The #1 most useful thing you can do in security when…
Post #Ax8YSdnQ03FDeoHbKy by [email protected]
0 likes, 1 repeats
A huge amount of the time, people played telephone with the requirement or adde…
Post #Ax93OykdFEIe4KiI5Y by [email protected]
0 likes, 1 repeats
@amuse Critical question: “what is the problem we are trying to solve?”
Post #Ax93ph3h8JVx10MtiC by [email protected]
0 likes, 1 repeats
@amuse The second most useful thing to do is do nothing. Wait a couple of days.…
Post #Ax94DU6AyAuzlpsCrQ by [email protected]
0 likes, 1 repeats
@hal_pomeranz the sweetest three words in operations are "Overcome by even…
Post #AxfigmgDpoJg4TwYjI by [email protected]
0 likes, 0 repeats
@amuse why security specifically? i'd say this applies to any requirements …
Post #AxfigmmxQlhiPN5wEC by [email protected]
0 likes, 0 repeats
@stefanct You're right
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.