Comment by firesteelrain
5 hours ago
That sounds like marketing.
Security tooling already automates scanning and exploit chaining. The hard part is context, accuracy, prioritization, and avoiding garbage results.
5 hours ago
That sounds like marketing.
Security tooling already automates scanning and exploit chaining. The hard part is context, accuracy, prioritization, and avoiding garbage results.
No comments yet
Contribute on Hacker News ↗