Find Out What The Top 6 Security Threats Are To Industrial IoT And How You Can Prevent Them

In the last decade, the world has witnessed the rapid evolution of the Internet of Things. While this technology has become pronounced in powering smart homes, outdoor surveillance and smart lighting, it is becoming increasingly pervasive in industrial spaces. Although there are plenty of use cases for industrial IoT solutions,

Read More

Systematically Pre-Empting Cybersecurity Threats And Damages

At BCG, we created a methodology for determining hidden cyber vulnerabilities. This cyber methodology is called STACHT (pronounced “stacked”), which stands for “system theoretic analysis of cyber hazards and threats.” When you adopt this methodology, you can identify hidden cybersecurity vulnerabilities using a six-step method. The methodology depends upon two

Read More