The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) has published a guidance document titled Choosing Secure and Verifiable Technologies, compiled to assist organizations in making informed decisions when procuring software (proprietary or open source), hardware (e.g., IoT devices), and cloud services (SaaS, MSP services). Digital supply chain threat environment (Source: Australian Cyber Security Centre) It’s aimed at senior executives, cybersecurity specialists, risk advisers, procurement professionals, as well as manufacturers of digital products and … More
The post How to choose secure, verifiable technologies? appeared first on Help Net Security.
This article has been indexed from Help Net Security
Read the original article: