We then invited penetration testers, which are security experts, who tried to attack the system and to find the loopholes, so that we can rest assured that when we are using the system, we configure it properly and so on.
j previous speech k next speech