cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Showing results for 
Search instead for 
Did you mean: 
Advocate III

Re: Best Practices for privileged account on laptops

> metasploit (Viewer II) posted a new reply in Tech Talk on 11-27-2018 08:09 PM in

> CyberArk EPM can easily fit your needs.  
[...]
>   Email: sam.lu@cyberark.com

Should we even *pretend* that this isn't just a big sales machine?

====================== (quote inserted randomly by Pegasus Mailer)
rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org
We learn from experience that men never learn anything from
experience. - George Bernard Shaw
victoria.tc.ca/techrev/rms.htm http://twitter.com/rslade
http://blogs.securiteam.com/index.php/archives/author/p1/
https://is.gd/RotlWB

............
This message may or may not be governed by the terms of
http://www.noticebored.com/html/cisspforumfaq.html#Friday or
https://blogs.securiteam.com/index.php/archives/1468
Newcomer I

Re: Best Practices for privileged account on laptops

Why would your devs be writing and testing code on their personal systems? They should be doing this in a dev environment. How would you control versioning, test, release if everyone's doing their own thing?