As organizations continue to rely on 3rd party vendors for business-critical services, it is imperative that they assess and properly manage these key partner security and data privacy programs. Supply chains continue to be a significant blind spot for most enterprise risk management programs and are often easily exploited by threat actors.

| less than a minute read
Apple Supplier Breached and IP Stolen - Is Your Organization Next?
A group of hackers named REvil has stolen and published product blueprints from Apple supplier Quanta Computer and is holding other blueprints under a $50 million ransom, Bloomberg reported Wednesday.