AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Supply chain attacks are an interesting method of compromising a computer system, but how do they work? Tom Explains.
Featuring Tom Merritt.
Full transcript here.
Hosted on Acast. See acast.com/privacy for more information.