Opinion
Why competition laws could increase the risk of blue screen attacks
We should beware of one-size-fits-all technology policies that could open smart devices to the third-party vulnerabilities that caused the CrowdStrike outage.
Michael Rogers and Jane M. HardyToday’s digital and technological ecosystem is both more important and more complex than anyone could have imagined even just a few years ago.
People now use connected devices for everything, from paying for their morning coffee to ordering a car, to finding romance. That connectivity, its operating technologies as well as the data it stores and accesses, is also increasingly underpinning our economies and national security. But as we all rely on our connected technologies for more purposes, we also create more vulnerabilities that could lead to disruptions.
Subscribe to gift this article
Gift 5 articles to anyone you choose each month when you subscribe.
Subscribe nowAlready a subscriber?
Introducing your Newsfeed
Follow the topics, people and companies that matter to you.
Find out moreRead More
Latest In Technology
Fetching latest articles