Aug. 6, 2022, 2:54 p.m. | /u/Jonathan-Todd

cybersecurity www.reddit.com

It's awesome how our industry is evolving right now in terms of [tracking](https://www.reddit.com/r/cybersecurity/comments/vubb5y/some_thoughts_questions_and_ideas_about_software/?utm_source=share&utm_medium=ios_app&utm_name=iossmf) vulnerability particularly in our ([often](https://logging.apache.org/log4j/2.x/security.html) open-source) code dependencies which can be incredibly numerous in even a small project. Yet, there seems to be a massive question mark when it comes to actually mitigating and managing these vulnerabilities. Patching them all, even just known ones, is impossible at scale.

Recently I began enjoying a game only to be disappointed to notice a massive number of reviews reporting cheaters. …

code cybersecurity devsecops exploits obfuscation

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cloud Security Engineer

@ Pacific Gas and Electric Company | Oakland, CA, US, 94612

Penetration Tester (Level 2)

@ Verve Group | Pune, Mahārāshtra, India

Senior Security Operations Engineer (Azure)

@ Jamf | US Remote

(Junior) Cyber Security Consultant IAM (m/w/d)

@ Atos | Berlin, DE, D-13353