Building vulnerability into your workflow – TechCrunc