U.S. Customs and Border Protection Data Breach Result of Supply Chain Attack

by Raquese Harris

Let’s take a moment and put on our hacker hats and think about how to carry out an attack on big enterprises. Current threat trends suggest that bad actors have a better chance at exploiting the vulnerabilities of a large entity's subcontractors and partners than targeting the systems of the big enterprise itself. When it comes to government contracts, this poses a large risk because the government has not historically had access to or control over the contracts between primes, the big enterprises, and their subcontractors.


Continue reading about how subcontractors are the real risk factor by reading Scott Ikeda’s article by clicking here.

Recommended Posts
Malachi Walker

Applying artificial intelligence in our everyday lives necessitates a perspective on how we are educating and learning about its capabilities.

Terry Roberts

Terry Roberts presents live show and podcast by providing insights to Workforce show's Cyber Edition. Click the link in the post and listen to the…

Katherine Bodendorfer

Companies need to consider a risk approach regarding the gaps in security. Risks to your revenue and reputation expand when sensitive information…