It’s looking more like the Internet of Threats at the moment – IBM
|
(Source: Telecoms.com) Threat detection software is available, machine learning algorithms can be written to monitor regular behaviour of devices/gateways and encryption techniques are common. There will need to be advances made but the foundations are there for a secure platform. Maybe we’re just about to find out who actually cares about …