Supply chain attacks are an interesting method of compromising a computer system, but how do they work? Tom Explains.
Featuring Tom Merritt.
Full transcript here.
Hosted on Acast. See acast.com/privacy for more information.