U.S. Customs and Border Protection Data Breach Result of Supply Chain Attackundefined undefined
Let's take a moment and put on our hacker hats and think about how to carry out an attack on big enterprises. Current threat trends suggest that bad actors have a better chance at exploiting the vulnerabilities of a large entity's subcontractors and partners than targeting the systems of the big enterprise itself. When it comes to government contracts, this poses a large risk because the government has not historically had access to or control over the contracts between primes, the big enterprises, and their subcontractors.
Continue reading about how subcontractors are the real risk factor by reading Scott Ikeda's article by clicking here.