A fascinating article from the Verge showing how a hacker successfully attacked a developer’s accounts. Worth the read to reinforce good security technical and process designs. What have you done to reduce the likelihood of these same techniques being successful in your organization?
Comments are closed.