Special Letter: Impersonating Machines – The Gift


Get Access

Speak With Representative
Access this content by contacting one of our representatives for assistance.
In this week's discussion, member and security CEO Jeff Hudson takes us to a yet more frightening place, one which seems equally inevitable, unless we take steps now: the theft of machine IDs.

Hide Details

Search Code: 84352
Published: August 11, 2017
Last Revised: August 11, 2017

2 Comments

  • Missing comment
    Amanda Bluett | 08-15-2017

    I think this is an extremely well written and informative article - I am pleased to have had the opportunity to read this, certainly opens up thinking wider and deeper on the topic of cyber security. Thank you.

    • 432c05244a845caaca3b276adb15a11e comment
      Info-Tech Research Group | 08-16-2017

      Thanks, Amanda. We're glad you enjoyed the article and we will pass along your praise to Mark Anderson.

mark anderson

Mark Anderson

Research Fellow

Mark Anderson writes the most accurate predictive reports covering the computing and communication industries. His weekly Trends and Predictions posts cover must-have information for strategy development and business technology planning, and are followed by technology executives and investors worldwide including Bill Gates, Paul Jacobs, Michael Dell and more.

Download Sample Article

Related Content

GET HELP Contact Us
×
VL Methodology