Listen "Where Do Vulnerabilities Come From?"
Episode Synopsis
Ben and Tom discuss:The 3 primary sources of vulnerability creationA comparison of defensive cyber security approachesChallenges of route cause analysis
More episodes of the podcast Let's Talk Security Testing
Does CAB Still Belong in Modern DevSecOps?
09/07/2025
Can AI Replace Pentesters?
31/03/2025
What Security Can Learn From Quality Control
27/01/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.