Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited third-party user accounts are a common thread in many data breaches. And as your ecosystem of vendors grows, so does the challenge of defending against such attacks. This paper from CA provides five best practices for controlling third-party vendor risks.
Phil Muncaster reports on China and beyond
Jon Collins’ in-depth look at tech and society
Kathryn Cave looks at the big trends in tech