Threat Vectors
Five Approaches and Tools For Organizations to Mitigate Their IoT/ICS Cyber Risks
Author(s):
Henry J. Sienkiewicz, Faculty, Georgetown University
Sam Kendrick, Student – Technology Management Program, Georgetown University (Co-author)
Infrastructure is everything you don’t think about. The roads you drive on. The rigs and refineries that turn fossil fuel into the gas that makes your car go. The electricity that power the streetlights and lamps that guide your way. All these technologies that vanish into the oblivians of normalcy.” Ian Bogost, The Atlantic[1] From … Read more