How can software vendors protect and defend against increasingly hostile threat actors?