(Source: Telecoms.com) Threat detection software is available, machine learning algorithms can be written to monitor regular behaviour of devices/gateways and encryption techniques are common. There will need to be advances made but the foundations are there for a secure platform. Maybe we’re just about to find out who actually cares about …