1 Comment
⭠ Return to thread

Data is half of it.

The other half is a threat model that:

(i) survives changes in Entry Points,

(ii) is focused on critical events/behaviors (as opposed to every little technical hiccup), and,

(iii) related to (ii), is fast enough to stop stuff in minutes.

Expand full comment