Technology Short Take #86
Scott Lowe
AUGUST 26, 2017
RedLock shares some guidelines around AWS access key deletion (in the event that an access key gets compromised). This is definitely something I’d like to explore further. Operating Systems/Applications. That might be a good blog post topic right there!). Servers/Hardware. Here’s a new acronym I just coined: YAKD.
Let's personalize your content