Technology Short Take 136
Scott Lowe
JANUARY 15, 2021
This article by Joshua Fox outlines how and when to use each of the various types of firewalls offered by AWS. The popular open source cryptography library known as Bouncy Castle has uncovered a severe authentication bypass vulnerability. Cormac Hogan shares some lessons learned using a Kubernetes Operator to query vSphere resources.
Let's personalize your content