Remove Computer and Electronics Remove Data collection Remove Examples Remove Manufacturing
article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: Right, the Trusted Foundry program I guess is a good example. BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? Of course, some nations have more capability than others to sift through huge amounts of data they’re collecting.

Security 206