Archive for 'May 2013'
Five Tips for Mitigating Key Elements of Supply Chain Risk
Many security professionals worry about intruder access via supply chain exploitation. It's scary to think that an adversary can bypass one or more security controls by infiltrating a business partner, vendor, software provider, or hardware supplier. This article shares five tips for mitigating key elements of supply chain risk.