
Is running legacy software with no publicly known exploits safe?
Krzysztof Bierówka
There is a lot of legacy software running all over the network. This is an excellent example of technological debt. And the debt means that we are borrowing. We borrow time before compromise.
READ article

