Blueprint: Build the Best in Cyber Defense cover image

Tony Turner: Securing the Cyber Supply Chain

Blueprint: Build the Best in Cyber Defense

00:00

Do You Really Have a Security Problem?

Software is prone to false positis, and es pol may be even worse than that. What you wind up with are about 80 to 90% third party open sorse code. There's no dynamic interaction between software and the underlying hardware. The best way to deter this kind of behavior is a vulety disclosure mechanism.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app