When the smallest vendor becomes the weakest cyber-threat link
feat.
John Shier
(2019-09-09)
Topic of Discussion
John Shier joins Jim Blasingame to discuss examples of how an unlikely vendor became the weak link connection that contributed to a major cyber-breach.
[more]