Note sull'episodio

Ben and Tom discuss:

  • The 3 primary sources of vulnerability creation
  • A comparison of defensive cyber security approaches
  • Challenges of route cause analysis