Top 10 Security Practices for Protecting Your Infrastructure
From firewalls, to user privileges, to access controls — this talk will not only explain the how, but also dive into the why of common security practices.
On my business card, I am a Developer Advocate. In my mind, I am an engineer. But in my heart, I am a teacher