In the last decade, the world has witnessed the rapid evolution of the Internet of Things. While this technology has become pronounced in powering smart homes, outdoor surveillance and smart lighting, it is becoming increasingly pervasive in industrial spaces. Although there are plenty of use cases for industrial IoT solutions,
Tag: threats
Systematically Pre-Empting Cybersecurity Threats And Damages
At BCG, we created a methodology for determining hidden cyber vulnerabilities. This cyber methodology is called STACHT (pronounced “stacked”), which stands for “system theoretic analysis of cyber hazards and threats.” When you adopt this methodology, you can identify hidden cybersecurity vulnerabilities using a six-step method. The methodology depends upon two