Like many organizations, the Department of Defense (DoD) uses a variety of software and tools produced by various supply chains, all of which can be compromised by an adversary. This is a risk that ...