For example, a software vulnerability allowed hackers to penetrate a major defense contractor's network, compromising trade secrets related to national security. The rise of cloud computing and remote ...