In a world of infrastructure quickly dominated by machine-to-machine network communications, and with billions to trillions of completely insecure IIoT devices embedded therein - well, what could possibly go wrong? In this week's issue, Jeff Hussey talks about how to respond to this threat. To all of our members who use electricity, drink water, or want to sleep at night, I know you'll be interested in what he has shared with us in this week's discussion.

Related Content

Hide Details

Search Code: 89564
Published: September 3, 2019
Last Revised: September 3, 2019

Social

Get Access

Speak With Representative
Access this content by contacting one of our representatives for assistance.
mark anderson

Mark Anderson

Research Fellow

Mark Anderson writes the most accurate predictive reports covering the computing and communication industries. His weekly Trends and Predictions posts cover must-have information for strategy development and business technology planning, and are followed by technology executives and investors worldwide including Bill Gates, Paul Jacobs, Michael Dell and more.

Download Sample Article