Controlling Third-Party Data Risk Should Be a Top Cybersecurity Priority Third-party breaches have a wide effect that legacy security practices can no longer detect. Source: htdarkreading.com