Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

What is a supply chain attack? Why you should be wary of third-party providers

Maria Korolov | Dec. 7, 2017
The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

These days, third-party risk management requires a new approach, says Routh. "One that enables companies to understand where risks lie within their digital ecosystem, tailor their controls according to those risks, and collaborate with their third parties to remediate and mitigate those risks."

More on hacks and breaches:

IDG Insider

 

Previous Page  1  2  3  4  5 

Sign up for Computerworld eNewsletters.