Follow @avatar42 on Micro.blog.
The time between discovery and exploitation of a security hole is decreasing dramatically. Having AI discover holes before deployment is becoming a must-have. From Vulnerability to Exploitation chart