We take this very seriously, and we believe that active penetration testing and forensics, and all these tools, enables us to have a clear understanding of our information technology’s infrastructure and its limitations, so that we use it in a responsible manner.

Keyboard shortcuts

j previous speech k next speech