Defense in Depth cover image

Who is Responsible for the Conflict Between Security and Developers?

Defense in Depth

00:00

Prioritization: From 6,000 CVEs to the Critical Few

Matt outlines prioritization pillars and urges actionable lists of truly reachable, exploitable vulnerabilities.

Play episode from 11:00
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app