“Additional defenses like establishing a zerotrust framework and having an automated method of quickly implementing firmware fixes are needed to …

This article was originally published here