Menu
Sign In Pricing Add Podcast

Ruby Rogues

Secrets Management Best Practices and Tools - RUBY 655

2473.108 - 2486.158 Brian Vallelunga

So like a very small device can then basically get access to the wifi network, which then gets access to every device on that network. And thus the attack starts. So there's a lot of exploits outside that don't have to start with just your computer or just AWS.

0
💬 0

Comments

There are no comments yet.

Log in to comment.