
Supply chain security: data erasure’s role when purchasing IT assets
IT teams need to guard their infrastructure from outside attack, but they must also look at software and hardware that come from third-party suppliers and vendor partners—even trusted ones.