For a lot of people, I would think that the answer to “what is a human?” Would be closer to religious and philosophical definitions than scientific ones.
For a lot of people, I would think that the answer to “what is a human?” Would be closer to religious and philosophical definitions than scientific ones.
VPN also have their attack surface: https://www.paloaltonetworks.com/cyberpedia/ivanti-VPN-vulnerability-what-you-need-to-know
Both can be true, a hardened service with strict segmentation and authorization can be harder to compromise than a loosely maintained VPN appliance.
Even when designing secure software, appliances and protocols, they can have their flaws.
I would say there is no definite answer for the question, it’s still on a case-by-case basis.
I think it’s very unrealistic to expect all sysadmins to spot uninitialized memory access in all software they don’t produce. This calls for independent software testing at scale which is more elaborate than just pushing the responsibility to sysadmins.