News Banner
Looking for an Interim or Fractional CTO to support your business?
Read more
Originally published by Astrix. Written by Dana Katz. A new generation of supply chain attacks has been rising in recent years. In such attacks, hackers abuse third-party & internal non-human access as a means of accessing core business systems. While many conversations about supply chain security risks focus on vulnerabilities in software application components themselves, or in their human-to-app connections, they overlook a critical area of supply chain security risk: non-human identi...