For those of you who are used to being responsible for an extensive cloud infrastructure, you’ll already be familiar with the joyous moment when someone hands you a random IP address, and tells you that it is running a vulnerable piece of software, or worse has already been compromised.
Tag, you’re “IT”!
Tag, you’re “IT”!
Tag, you’re “IT”!
For those of you who are used to being responsible for an extensive cloud infrastructure, you’ll already be familiar with the joyous moment when someone hands you a random IP address, and tells you that it is running a vulnerable piece of software, or worse has already been compromised.