Growing threat landscape scales with growth of programmable devices throughout the network and ITE. Proprietary software deployed on these devices creates opportunities for militious threats.
Vulnerability of the supply base chain of custody from component manufacturing, thru deployment and decommissioning.