Archive

Search Blog

Category: Transparent Supply Chain
photo

Increasingly, enterprises are demanding hardware sourcing authentication as a way to prevent counterfeit components from creating vulnerabilities within networks or systems. Incidents like the recent revelation that Apple may have purchased compromised motherboards are the reason that sourcing information and verification of supply chain integrity are becoming mandatory for certain contracts.  Read More

photo

Intel's Transparent Supply Chain

Posted on March 02, 2016

Media coverage of cyber attacks in recent years have turned the public’s attention towards enhancing network security. While most of these high-profile intrusions were the result of software-based attacks, a more concerning threat lurks behind the scenes: hardware compromises. Research data shows that around 16 percent of companies purchased counterfeit hardware equipment from 2006 to 2008.  Read More


« Previous123456...28Next »