Twilio Security: A Tale of Cloud Compromise
Security breaches occur at a rapid rate, affecting not only large companies but start-ups. Many customers ask us how to secure their infrastructure and applications early, in a way which will scale as they grow.
The Twilio Security Team will answer this through a case study of real compromises. As Twilio builds and secures our infrastructure with the same tools as our customers, we'll use these examples to share our learnings and how we built a security framework which scales with our business.
Ben Waugh, Coleen Coolidge