We also make sure it’s not connected directly for example to the Internet or it need the special VPN or direct clients to connect to. We pay a lot of effort and also money to white hat hackers so we work with penetration testers. Our white hat hackers took again the second place the Defcon CTF, second only to the US team.

Keyboard shortcuts

j previous speech k next speech