This article will explore two sides of the IIoT security equation: understanding how and why IIoT systems can become vulnerable to hacking attempts, and which solutions and strategies are available to harden them. It will provide also a set of best practices to address IoT security concerns.
By Martin Giess
www.itsec.hk
www.itsec.vip
www.itseceu.uk
Leave a Reply