The traditional concept of the security perimeter is long-outdated, and as recent headline-grabbing data breaches have shown, we must also monitor to the corporate supply chain as a source of potential security issues down the road. And as business systems become increasingly interconnected, the risks can grow as well.
- How a vendor in your supply chain could (inadvertently) introduce risk to your organization
- Methods an attacker can use to pivot from the vendor to get directly to you
- Steps you can take to reduce your risk -- or at the very least, be more aware of your risk exposure
As always, if there's a topic you'd like to see us cover on Whiteboard Wednesday, Tweet us @rapid7, or use the hashtag #Rapid7WbW. Thanks!
~ @mvarmazis, Community Manager