Author: John Love

Extended supply chains can represent cybersecurity risks that increase significantly with each and every new supplier. Too often hardware component manufacturers and software component developers who are not household names feel that they’re not a target and they are less diligent about their security procedures....

Security teams work tirelessly every day to protect us from some very skilled cybercriminals. They face a very accomplished and persistent enemy that is bent on stealing our money, personal information, and intellectual property, and generally disrupting business operations. And they do so with inadequate...