Josh Brodbent of BeyondTrust contributed article. Securing the hardware and software systems in power plants, water treatment facilities, transportation systems and other critical infrastructure calls for network visibility, vulnerability assessment and holistic strategic and incident response plans.
Read the full story: https://insider.govtech.com/ca...