Skip to content
Resilient Software Systems Colloquium
June 17
|
$400

The Department of Defense’s (DOD) reliance on aging IT infrastructure, using security standards developed over the last 30 years, creates inherent vulnerabilities in its systems, from legacy architectures to advanced weapons.
Adversaries like Volt Typhoon are actively exploiting these vulnerabilities, gaining access to critical infrastructure. They are also stealing and re-engineering sensitive military system source code.
Page load link