An anonymous reader writes "'Cyber espionage, crime, and warfare are possible only because of poor application or system design, implementation, and/or configuration,' argues U.S. Air Force cyber security researcher. 'It is technological vulnerabilities that create the ability for actors to exploit the information system and gain illicit access to sensitive national security secrets, as the previous examples highlight. Yet software and hardware developers are not regulated in the same way as, say, the auto or pharmaceutical industries.'
'The truth is that we should no longer accept a patch/configuration management culture that promotes a laissez-faire approach to cyber security.'"
Link to Original Source