Exploring Security by Design

(Source: Automation.com (press release)) However, what about IT security? It’s easy to imagine that many of these new products and devices are directly connected to the internet, or even establish a bridge from the internet to the company’s internal network. Furthermore it’s well known that the connection points of public networks are sensitive. They should only be …