Author(s):
Mark Anderson
In a world of infrastructure quickly dominated by machine-to-machine network communications, and with billions to trillions of completely insecure IIoT devices embedded therein - well, what could possibly go wrong?
In this week's issue, Jeff Hussey talks about how to respond to this threat. To all of our members who use electricity, drink water, or want to sleep at night, I know you'll be interested in what he has shared with us in this week's discussion.