Enhance cybersecurity awareness and survivability for DoD, industry partners, and academia in the face of the ever-increasing threat of cyber attacks. Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and physical form. CS includes information availability, identification and authentication, confidentiality, integrity, and non-repudiation as well as the economic considerations with respect to selection of CS techniques, CS processes, and industry trends.
Watch Out! Hackers are After Legacy Software
- This topic has 1 reply, 1 voice, and was last updated 4 months, 3 weeks ago by .
-
Topic
-
Legacy or obsolete software, which stops receiving security updates after it reaches the end of life, can serve as potential fodder for cyberattacks. Despite this well known security risk, several firms continue to operate outdated software.
Here is the link: https://cyware.com/news/watch-out-hackers-are-after-legacy-software-5c76b0d3
You must be logged in to reply to this topic.