Technology Short Take 136
Scott Lowe
JANUARY 15, 2021
This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. More details are available in this article. Compute safely.
Let's personalize your content