VT DevCom
Password-less SSH keys ease setting up services but need to be restricted to maintain security. How is that done when jump hosts are involved?
There are many different avenues our sites can be attacked, including (but not limited to) XSS, SQL injection, and CSRF. Fortunately, there are several best-practices we can follow to help reduce the blast radius of a vulnerability. Observatory by Mozilla This free tool scans…