Jeff Melrose
Articles
Cybersecurity March 22, 2016
Cyber security protection enters a new era
Watch for a backdoor cyber security assault. The Juniper Networks incident in December 2015 changed how industry looks at device security as hackers exploit deliberate weaknesses being installed into software. End users, integrators, and device manufacturers need to adapt and prepare for this new reality. Follow these cyber security steps.
By Jeff Melrose
Mobility August 12, 2015
Security for wireless instrumentation
Cover story: Keeping wireless field device communications secure: Protocols for wireless instrumentation and other field devices use encryption as a key security element. Is it enough?
By Jeff Melrose