Zero-day attacks: How DoD should defend from the unknown

Source: C4ISR & Networks

“Zero-day attacks require flaws in software,” Galois’ Wick said. “No matter what your ratio is between lines of code in a system and the number of flaws in a system, less software on a system means less lines of code, which means fewer flaws.”