In every arena, smart enemies choose the path of least resistance. In the data security realm, that path increasingly goes through third-party vendors and subcontractors. Secure Halo shared its thoughts on this subject in an article for Help Net Security.
Addressing Third-Party Security Risks
IT Business Edge published an article on "Addressing Third-Party Security Risks," in which Will Durkee, Director of...