Cyberattack method where stolen account credentials are used to gain unauthorized access to user accounts through large-scale automated login requests.
Four key metrics (deployment frequency, lead time for changes, time to restore service, change failure rate) used to measure software delivery performance.