Webinar: Are we demanding enough cyber-resilience in devices?
Webinar: Are we demanding enough cyber-resilience in devices?
Overview Approaches to cyber-resilience should be both top-down and bottom-up. Devices come under attack the minute they are put on the internet and, once compromised, recovery can be difficult. Vendors of hardware and firmware should be providing cyber-resilience at source. So, what can be done to significantly improve cyber-resilience from the bottom-up, driving self-recoverable cyber-resilient … Continue reading "Webinar: Are we demanding enough cyber-resilience in devices?"