Securing the Keys to the Kingdom

Hardening the IoT-connected supply chain In the IT community, it is often said that the best defense against a cyber-attack is to “think like a hacker.” This tactic may work when an attack is directed at network infrastructure, and the goal is to protect technical information from exfiltration or exploitation. But, when the threat reaches … Continue reading Securing the Keys to the Kingdom