Monitoring Third-Party Breach Risks

Published: Feb. 4, 2015, 8:43 p.m.

b"Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight."