In this episode:We discover Twitter exposes phone numbers without consent,Cloud computing security,Paper tigers,Security incident planning,Story time with Chris and Ryan,Upcoming security conventions (which ones to go to...)
In this episode:We discover Twitter exposes phone numbers without consent,Cloud computing security,Paper tigers,Security incident planning,Story time with Chris and Ryan,Upcoming security conventions (which ones to go to...)