The consequences of using a tampered product could affect any sector. From a Email List nuclear reactor to financial trading to other areas of the business, ”adds Conway. The situation is worrying enough. Indeed, some researchers have discovered digital espionage Email List campaigns that have targeted energy companies. The Open Group's first move was to publish the Open Trusted Technology Supplier Standard, the first guide that helps organizations against the growing sophistication of cybersecurity attacks.
Then a pilot program with an independent laboratory Email List capable of verifying the security of IT products is expected. By the end of the year, an accreditation system is expected to be introduced for IT suppliers capable of demonstrating that their supply chain and Email List production processes are safe. All vendors are expected to demonstrate that they are using best practices to develop technology securely, identify potential security vulnerabilities in their products, and manage possible risks that may come from their suppliers.
Sally Long, director of the Open Group's technology Email List forum, said there have already been cases of malicious code and counterfeit components trying to break into government systems. "That's why governments, and not just the United States, want to protect the supply chain." “For this there will be a pervasive raising of the safety bar throughout the supply chain” is Conway's opinion.At the Email List Forum 2013 the CEO Marco Icardi emphasizes the simplicity of data visualization 17 Apr 2013 Manuela Gianni Marco Cardin.