Is Apple willing to pay for supply chain security? Could they afford it?<p><pre><code> Writing for this week’s newsletter put out by the SANS Institute,
a security training company based in Bethesda, Md., editorial board
member William Hugh Murray has a few provocative thoughts:
1. Abandon the password for all but trivial applications.
2. Abandon the flat network.
3. Move traffic monitoring from encouraged to essential.
4. Establish and maintain end-to-end encryption for all applications.
5. Abandon the convenient but dangerously permissive default access control rule of “read/write/execute”</code></pre>