Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited third-party user accounts are a common thread in many data breaches. And as your ecosystem of vendors grows, so does the challenge of defending against such attacks. This paper from CA provides five best practices for controlling third-party vendor risks.
Adrian Schofield sheds light on tech in South Africa
Mark Chillingworth on IT leadership