Attackers increasingly use third-party service providers to bypass organizations’ security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create.
from Dark Reading: https://ubm.io/2XGCdrx
via IFTTT