Published: 
By  Jennifer McManamay

Consider a seemingly small event for today's high-tech lifestyle: A package you ordered from a retailer arrived exactly as you expected, because the seller communicated when your purchase shipped, where it was along the way and how the deliverer would confirm the package got to the right person. Let's say the package contained perishables like food or medicine; there was verification that your package was kept at a cold temperature and not handled roughly on the trip. That's an example of a smart supply chain, an integrated system employing a network of humans and technologies that track your purchase from point of origin to your doorstep. But how do you know the various technologies in the supply chain are not compromised — loaded with malware, for instance, that will be used to gather information to target you for theft or infect nearby systems with viruses? Could one or more of the thousands of devices that run the supply chain be counterfeit? Technology manufacturers, governments and other entities such as the organizations that develop the standards for technology are called upon to ensure security and trust in integrated systems such as supply chains. That's getting increasingly difficult to do as bad actors tamper with the countermeasures engineers build into devices and connected systems.