How to choose secure, verifiable technologies?

The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services (SaaS, MSP services). Digital supply chain threat environment (Source: Australian Cyber Security Centre) It’s aimed at senior executives, cybersecurity specialists, risk advisers, procurement professionals, as well as manufacturers of digital products and … More

The post How to choose secure, verifiable technologies? appeared first on Help Net Security.

This article has been indexed from Help Net Security

Read the original article: