Posted
over 6 years ago
Well, this is a follow-up of my last posts about how I secure my environment. If you want to read the earlier posts of the series, see at the end of this post.
So, we did the Risk Assessment, now, let's look a little bit closer into my perimeter. Technically...