
Triple R’s of Security What are the “3 R’s of Security”? A quick Google on that topic will result in a fair few decent explanations of what that can mean. The TL;DR is basically, rotate (credentials), repair (vulnerabilities) and repave (services and servers to a known good state). This approach is gaining popularity mainly due […]
Categories:
Tags:
Comments are closed