ChaiOne Insights: information security strategy

Utility Companies: Rethink Your IoT Information Security Strategy

5 minutes read

A few researchers plugged their laptop into a spot behind the dashboard of the Tesla Model S and started the car with a software command at a digital security conference this month. Even scarier: they planted a remote-access trojan while the laptop was plugged in and then cut the engine from the same laptop while someone else was driving later. That very night, Tesla sent out a patch to correct the vulnerability.

Read More

Subscribe to
our Newsletter!

Keep up with new insights from industry leaders on digital transformation, mobile app development, enterprise architecture, and tech innovation topics.