Organizations can no longer protect themselves by simply securing their electronic perimeter; threat actors intentionally target the suppliers of more cyber-mature organizations to take advantage of the weakest link. For supply chain risk mitigation see: https://t.co/QdYX902BTa pic.twitter.com/cRrOvxVkbk
— NCSC (@NCSCgov) July 10, 2024