“There is no doubt that the global IT security threat landscape has evolved over the last decade, with governments and big businesses increasingly becoming the targets of cyber attackers. … The problem is that any IT product can include tainted or counterfeit components, which may include vulnerabilities that can leave them wide-open for cyber attacks. ... What is needed is a way of identifying trusted providers, component suppliers (hardware and software), integrators and resellers, so that customers know who is following the best practices and with whom they should partner. …”
More at Information Age.