Lauren Yacono
by Lauren Yacono
on February 02, 2022

With a successful supply chain attack against just one organization—often an unremarkable technology vendor—a criminal group can gain privileged access to the network of one (or all) of its customers.