(Source: WTOP) This must all be done while ensuring the security of data and infrastructure in an … can exploit known vulnerabilities in legacy software as well as new platforms.