
Sunsetting Domains
What to do when you no longer need a domain
What to do when you no longer need a domain
Threat Modeling is not everyone's cup of tea, but let's threat model everyone's cup of tea.
Vulnerabilities are technology, security and risk vertical, as should be the management.
Thoughts on Imposter Syndrome, In summation; Imposter Syndrome is the consequence of poor support.