Monthly Archives: February 2014

Enhanced Cybersecurity Services: Protecting Critical Infrastructure

Comprehensive cybersecurity is an unfortunate necessity in the connected age, as malwares like Duqu, Flame, and Stuxnet have proven to be effective Embedded PC instruments of espionage and physical sabotage rather than vehicles of petty cybercrime. In an effort to … Continue reading

Posted in Uncategorized | Tagged , , , , , | Comments Off on Enhanced Cybersecurity Services: Protecting Critical Infrastructure

Machine-to-Machine (M2M) Gateway: Trusted and Connected Intelligence

The factory of the future will still have Programmable Logic Controllers (PLCs) and Human-Machine Interface (HMI) panels, but someone half a world away will likely be monitoring and controlling them. That person may be sitting at a desk watching over … Continue reading

Posted in Uncategorized | Tagged , , , , , | Comments Off on Machine-to-Machine (M2M) Gateway: Trusted and Connected Intelligence