top of page
![](https://static.wixstatic.com/media/992247_d281666a114e463b8878fb0b4ef3845a.jpg/v1/fill/w_147,h_92,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/992247_d281666a114e463b8878fb0b4ef3845a.jpg)
![](https://static.wixstatic.com/media/992247_f12f90b51cb749a4874d35d021ec4c74.jpg/v1/fill/w_147,h_98,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/992247_f12f90b51cb749a4874d35d021ec4c74.jpg)
![](https://static.wixstatic.com/media/992247_d281666a114e463b8878fb0b4ef3845a.jpg/v1/fill/w_147,h_92,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/992247_d281666a114e463b8878fb0b4ef3845a.jpg)
1/2
creditcontrol.co.uk
​
​
Can IoT adopters manage the security and privacy challenges in smart utilities?
​
The utility sector is undergoing a huge transformation, becoming highly connected infrastructures, with millions of endpoints, including smart meters and smart grid devices. These increasingly interconnected systems are a high-profile target for
attackers and nation states looking to bring down a country’s critical infrastructure.
Download Full Paper...
bottom of page