Jeff Melrose


Cybersecurity March 22, 2016

Cyber security protection enters a new era

Watch for a backdoor cyber security assault. The Juniper Networks incident in December 2015 changed how industry looks at device security as hackers exploit deliberate weaknesses being installed into software. End users, integrators, and device manufacturers need to adapt and prepare for this new reality. Follow these cyber security steps.

By Jeff Melrose
Mobility August 12, 2015

Security for wireless instrumentation

Cover story: Keeping wireless field device communications secure: Protocols for wireless instrumentation and other field devices use encryption as a key security element. Is it enough?

By Jeff Melrose
All Articles