"Supply Chains May Pose Weakest Security Link"
Vulnerabilities in the U.S. military supply chain are being exploited by adversaries to execute attacks aimed at stealing valuable technical data, damaging critical infrastructure, gaining access to connected systems, degrading systems, and more. It has been recommended that the U.S. takes a holistic approach to responding to such threats by scoring supply chain liabilities based on their level of risk. The scoring of suppliers would require the performance of internal or external monitoring and frequent assessments of security risks. This article continues to discuss the exploitation of vulnerabilities contained by the U.S. military supply chain and the recommended approach to improving supply chain security that involves risk scoring.
SIGNAL Magazine reports "Supply Chains May Pose Weakest Security Link"