Suppliers Spotlighted After Breach of Border Agency Subcontractor

Attackers increasingly use third-party service providers to bypass organizations’ security. The theft of images from US Customs and Border Protection underscores the weakness suppliers can create.

You can read the full article here.