searching for flaws in technology, bringing in others who act out hacking attempts in a safe environment, and anticipating innovative technological advances by adversaries
searching for flaws in technology, bringing in otherswho act out hacking attempts in a safe environment,and anticipating innovative technological advances byadversaries