Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited third-party user accounts are a common thread in many data breaches. And as your ecosystem of vendors grows, so does the challenge of defending against such attacks. This paper from CA provides five best practices for controlling third-party vendor risks.
Mark Chillingworth on IT leadership
Phil Muncaster reports on China and beyond
Kathryn Cave looks at the big trends in tech