Hardware security is often the elephant in the room in the security world. The majority of the technology and hardware we use is difficult to trace, and therefore impossible to trust.
The most important question to ask on a global level before crafting a security strategy is —why does it matter? Hardware breaches are difficult to implement, as they have a physical component and often require both planning and a bit of luck, but once a device’s hardware has been hacked it is incredibly vulnerable.