Time to start thinking about secure configurations. What is a secure configuration? What gets configured? How do you manage them?
This is just the beginning!
FIND US ON
1. Facebook
2. Twitter - DamienHull