Handling security and risk across the IT source chain: A simple approach Some pieces of this article are sourced from: www.itpro.co.uk