May 5, 2022
Author(s)
Jon Boyens, Angela Smith, Nadya Bartol, Kris Winkler, Alexander Holbrook, Matthew Fallon
… are counterfeit, or are vulnerable due to poor manufacturing and development practices within the supply … decreased visibility into, and understanding of, how the technology they acquire is developed, integrated, and … risk management, acquire, information and communication technology, supply chain, cybersecurity supply chain, supply …