Suppliers Spotlighted After Breach of Border Agency Subcontractor

Attackers increasingly use third-party service providers to bypass organizations’ security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create.

from Dark Reading: https://ubm.io/2XGCdrx
via IFTTT