The use of misconfigured, outdated and end-of-life products can and is resulting in massive vulnerabilities in global network infrastructure security, causing disruptions to both businesses and ...