In the IT community, it is often said that the best defense against a cyber-attack is to “think like a hacker.” This tactic may work when an attack is directed at network infrastructure, and the goal is to protect technical information from exfiltration or exploitation.
Thanks for checking out ICYMI during this Christmas week. We’re glad to be an excuse you can use to avoid the relatives for at least a little while. If you read all the linked articles, you can probably hide for an hour or more. So, find a hiding place, and let’s catch up.
While it might feel like the rubber truly meets the road at the manufacturing stage, the design process is truly where creators’ great ideas take shape. It’s also where you’ll make major decisions that impact your production and deployment.
Although we haven’t seen any IoT-enabled fireworks for July Fourth next week, there’s still time for that news to appear. If you have a lead on some boom-bang-IoT, let us know. Until then, let’s see what happened that deserves a closer look in the world of IoT integration.