Security

  1. Events
  2. Security

Views Navigation

Event Views Navigation

Today

Secure Sourcing of COTS Software

Virtual

Systems are built by integrating components upwards from the lowest level of the supply chain to the finished, often highly complex, product. That upward integration process represents a potential security weakness.