It is said that an enterprise is only as secure as its weakest link. Today, that weak link often turns out to be partners, suppliers, and others with persistent network and application access.
These weak links have certainly placed third-party security into the spotlight. As we

The link for this article located at CSO Online is no longer available.