T-mobile Hack Exposes Continued Risk of Working With Vendors
Approximately one-third of successful cyber attacks are accomplished via the compromise of an insecure vendor. This is, to use a technical term, absolutely nuts. Imagine that you’re a large company. You’re doing everything right, in terms of information security. You’ve got three kinds of firewalls, a stable of well-paid analysts, and all of your critical … Read more