Hacker Newsnew | past | comments | ask | show | jobs | submit | pickyman's commentslogin

Well depends, how indepth the audits are being done, i mean not just simple port checks or MFA, but much more into server configuration, policies, permissions, cloud audits etc.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: