Using Components with known vulnerabilities This one is a lot more specific to application or website development; using components with…
Insufficient logging and monitoring According to the OWASP organisation, the average time it takes for a breach to be detected…