Every time there’s a new technology, it’s got to be explored from the security perspective, to figure out what are the vulnerabilities? What are the kill chains that would allow an attacker to exploit it? Once those are identified, the business decides whether they want to take that risk.


Read eBook


Telecoms, Media & Entertainment, Digital Transformation, BT Ireland