{"id":2847,"date":"2025-04-30T06:00:00","date_gmt":"2025-04-30T13:00:00","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/perspectives\/?p=2847"},"modified":"2025-06-06T08:58:28","modified_gmt":"2025-06-06T15:58:28","slug":"your-vendors-cyber-failure-will-become-your-next-crisis","status":"publish","type":"post","link":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/","title":{"rendered":"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis"},"content":{"rendered":"\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/www.paloaltonetworks.com\/perspectives\/wp-content\/uploads\/2025\/04\/Perspectives-Podcasts-6.wav\"><\/audio><\/figure>\n\n\n\n<p>Listen to the Discussion (<em>Generated by NotebookLM<\/em>)<\/p>\n\n\n\n<p>As organizations scale and modernize, their reliance on third-party vendors grows in parallel. From payroll processors and patent counsel to software providers and logistics partners, these external relationships have become essential to business operations. But each new vendor connection also opens a new door to cyber risk \u2014 and far too many of those doors are left unguarded.<\/p>\n\n\n\n<p>Third-party cybersecurity risk isn\u2019t a theoretical concern; it\u2019s an escalating, enterprise-wide threat with the potential to trigger operational disruptions, reputational damage, and regulatory fallout. Yet despite its severity, many organizations continue to delegate vendor risk management to procurement, where the approach is often reduced to annual checklists and self-assessment questionnaires.<\/p>\n\n\n\n<p>That\u2019s not just outdated \u2014 it\u2019s dangerous.<\/p>\n\n\n\n<p>Research from PwC notes that only 31% of companies assess vendor cybersecurity risk through formal, organization-wide processes. The rest are flying blind. In a world where even midsize firms may manage dozens (or hundreds) of vendor relationships \u2014 many with privileged access to sensitive systems and data \u2014 this status quo is untenable.<\/p>\n\n\n\n<p>Third-party vendor cybersecurity risk represents an existential threat to nearly every organization. And it demands executive-level urgency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Third-Party Vendor Risks Turn into Cyber Vulnerabilities<\/h2>\n\n\n\n<p>There have been numerous high-profile, headline-grabbing examples of third-party vendor risks turning into massive cybersecurity problems. The highly publicized <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/12\/solarwinds-statement-solarstorm\/\">SolarWinds<\/a> attack from 2020 and the 2013 <a href=\"https:\/\/finance.yahoo.com\/news\/target-39-4-mln-settlement-174430351.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAANabtxTLwPvddxD0SGIj6QzXsBAkv_-nrPUTcc6exmfeL493yuNTGJZCr2UCe2Krrz5ZD8F8uJXsrHMBjh-u7VhKGO7LAsohoWWv1f_L9docBMVMA1jHVao__6Jk1CWxbOK3nty5DlJoWMcIfQ003mUWC38RqR45ez5t1zAW9GOjhttps:\/\/finance.yahoo.com\/news\/target-39-4-mln-settlement-174430351.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAANabtxTLwPvddxD0SGIj6QzXsBAkv_-nrPUTcc6exmfeL493yuNTGJZCr2UCe2Krrz5ZD8F8uJXsrHMBjh-u7VhKGO7LAsohoWWv1f_L9docBMVMA1jHVao__6Jk1CWxbOK3nty5DlJoWMcIfQ003mUWC38RqR45ez5t1zAW9GOj\">Target<\/a> breach are vivid examples of what happens when third-party risk becomes an open backdoor to your business. These, too, are far from isolated cases. Across every industry, attackers are exploiting the weakest links in digital supply chains \u2014 often with devastating results.<\/p>\n\n\n\n<p>Today\u2019s attackers aren\u2019t limiting themselves to traditional IT vendors. They\u2019re just as likely to target financial service providers, cloud and telecom partners, or even the power company. If a vendor connects to your systems \u2014 directly or indirectly \u2014 they\u2019re in scope. That includes software developers, OEMs, distributors, and increasingly, customers.<\/p>\n\n\n\n<p>Once inside, attackers don\u2019t rush. They move laterally across networks, hunting for sensitive data: customer records, intellectual property, credentials. Many embed malware inside APIs, browser plug-ins, or update mechanisms \u2014 slipping past defenses by mimicking trusted processes.<\/p>\n\n\n\n<p>The software supply chain is particularly exposed. In fact, research from Enterprise Strategy Group points out that 41% of organizations\u2019 software supply chains have been hit with zero-day attacks, exploiting new or previously unknown vulnerabilities in third-party code, while 40% of organizations report they\u2019ve been hit with exploits of a misconfigured cloud service.<\/p>\n\n\n\n<p>These aren\u2019t edge cases. They\u2019re warning signs. And they confirm what many CISOs already know: Third-party risk isn\u2019t just a cybersecurity problem. It\u2019s an enterprise vulnerability \u2014 one that demands constant vigilance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The High-Stakes Consequences of Vendor-Based Attacks<\/h2>\n\n\n\n<p>Third-party attacks often unfold quietly \u2014 and by the time they\u2019re discovered, the damage is already done.<\/p>\n\n\n\n<p>A single compromised partner can expose sensitive data, disrupt operations, and force an organization into an extended cycle of forensic investigation, remediation, and recovery. In these moments, it\u2019s not just systems that go down. It\u2019s trust \u2014 with customers, regulators, partners, and the public.<\/p>\n\n\n\n<p>The regulatory consequences alone can be staggering. From <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/gdpr-compliance\">Europe\u2019s GDPR<\/a> to <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/pii\">Brazil\u2019s LGPD<\/a> and the U.S. healthcare industry\u2019s <a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/what-is-hipaa\">HIPAA<\/a>, data protection frameworks now hold organizations accountable for breaches, regardless of where the vulnerability originated. Financial penalties are one thing. Long-term reputational damage is another.<\/p>\n\n\n\n<p>This is what makes third-party risk so dangerous: it scales with your growth. Every new vendor, every additional integration, every expansion into a new market increases the attack surface. Without real-time visibility into partner ecosystems, that surface becomes a blind spot \u2014 one that adversaries are increasingly skilled at exploiting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Organizations Should Do \u2014 Now<\/h2>\n\n\n\n<p>The rise in third-party risk demands more than a procedural response \u2014 it requires a mindset shift. Traditional approaches such as static audits, vendor questionnaires, and one-time compliance checkboxes no longer suffice in an era where the attack surface is continuously expanding through external relationships.<\/p>\n\n\n\n<p>Here\u2019s what needs to change:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Classify vendors by business criticality.<\/strong> Not all third parties carry equal risk \u2014 and your cybersecurity expectations should reflect that. Organizations should adopt a tiered model that assigns suppliers into risk categories based on their operational importance and level of system access. For critical vendors, enforce full adherence to your <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/zero-trust-for-critical-infrastructure\/\">Zero Trust<\/a> policies, including rigorous identity verification, segmentation, and continuous monitoring. For mid-tier or low-risk suppliers, ensure baseline controls are met, but scale the requirements proportionally.<\/li>\n\n\n\n<li><strong>Move from point-in-time to real-time risk assessment.<\/strong> Third-party environments are dynamic \u2014 what\u2019s secure today may be vulnerable tomorrow. Risk evaluations must evolve accordingly. Regularly reassessing long-standing vendor relationships is just as critical as scrutinizing new ones.<\/li>\n\n\n\n<li><strong>Insist on Zero Trust principles \u2014 everywhere.<\/strong> A Zero Trust model should apply across your extended enterprise, including vendors. If partners aren\u2019t segmenting access, validating identity at every point of entry, and monitoring anomalous behavior, then your defenses are only as strong as their weakest node.<\/li>\n\n\n\n<li><strong>Align vendors to your own policy architecture.<\/strong> Too often, partners operate under looser protocols. Instead, organizations should require vendors to adhere to internal policy frameworks \u2014 from data handling to incident response \u2014 with no exceptions.<\/li>\n\n\n\n<li><strong>Use modern threat intelligence and automation.<\/strong> Real-time visibility into third-party risk is possible today, but it requires investment in intelligent tooling. AI and machine learning can surface vulnerabilities before they\u2019re exploited, especially when continuously fed with live telemetry and threat intelligence.<\/li>\n\n\n\n<li><strong>Proactively share threat intelligence across critical suppliers.<\/strong> Organizations must do more than secure their own perimeter \u2014 they must uplift the collective resilience of their ecosystems. At a minimum, critical suppliers should participate in bidirectional intelligence sharing, especially in industries like energy, healthcare, and retail where these practices lag behind those in financial services. A compromised vendor is still a breach on your books.<\/li>\n\n\n\n<li><strong>Extend accountability across the ecosystem.<\/strong> Your third parties aren\u2019t just business relationships \u2014 they\u2019re extensions of your digital perimeter. And with that privilege comes responsibility. Make continuous security monitoring part of your procurement lifecycle, not an afterthought.<\/li>\n<\/ul>\n\n\n\n<p>Ultimately, the question isn\u2019t whether your vendors are a risk. It\u2019s how quickly you can identify which ones are \u2014 and what you do about it. As regulatory scrutiny rises and cyberattacks grow more sophisticated, there is little room left for assumptions or trust-by-default.<\/p>\n\n\n\n<p>Raising the bar on third-party risk isn\u2019t just about avoiding the next breach. It\u2019s about protecting the business you\u2019ve built \u2014 and the reputation you can\u2019t afford to lose.<\/p>\n\n\n\n<p>Curious to see what else Haider has to say? Check out his other articles on <a href=\"https:\/\/www.paloaltonetworks.com\/perspectives\/author\/haider-pasha\/\">Perspectives<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p class=\"has-small-font-size\"><sup>1<\/sup> \u201c<a href=\"https:\/\/www.pwc.com\/us\/en\/services\/audit-assurance\/digital-assurance-transparency\/vendor-cybersecurity-risk.html\">How SOC reporting can help assess cybersecurity risk management in third-party relationships\u2014and beyond<\/a>,\u201d PwC, 2022.<br><sup>2<\/sup> The growing complexity of securing the software supply chain, Enterprise Strategy Group, May 2024<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Third-party cyber risks are escalating, enterprise-wide threats.<\/p>\n","protected":false},"author":1,"featured_media":2848,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,19],"tags":[],"coauthors":[42],"class_list":["post-2847","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-staying-ahead-of-evolving-threats","category-third-party-risk-assessment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis - Perspectives<\/title>\n<meta name=\"description\" content=\"Third-party cyber risks are escalating, enterprise-wide threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis - Perspectives\" \/>\n<meta property=\"og:description\" content=\"Third-party cyber risks are escalating, enterprise-wide threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/\" \/>\n<meta property=\"og:site_name\" content=\"Perspectives\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-30T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T15:58:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"840\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Haider Pasha\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"headline\":\"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis\",\"datePublished\":\"2025-04-30T13:00:00+00:00\",\"dateModified\":\"2025-06-06T15:58:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/\"},\"wordCount\":1128,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg\",\"articleSection\":[\"Staying Ahead of Evolving Threats\",\"Third Party Risk Assessment\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/\",\"name\":\"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis - Perspectives\",\"isPartOf\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg\",\"datePublished\":\"2025-04-30T13:00:00+00:00\",\"dateModified\":\"2025-06-06T15:58:28+00:00\",\"author\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\"},\"description\":\"Third-party cyber risks are escalating, enterprise-wide threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg\",\"width\":1920,\"height\":840},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/\",\"name\":\"Perspectives\",\"description\":\"What\u2019s next for business and technology innovators.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44\",\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"contentUrl\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/localhost\/wordpress\"],\"url\":\"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis - Perspectives","description":"Third-party cyber risks are escalating, enterprise-wide threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/","og_locale":"en_US","og_type":"article","og_title":"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis - Perspectives","og_description":"Third-party cyber risks are escalating, enterprise-wide threats.","og_url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/","og_site_name":"Perspectives","article_published_time":"2025-04-30T13:00:00+00:00","article_modified_time":"2025-06-06T15:58:28+00:00","og_image":[{"width":1920,"height":840,"url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg","type":"image\/jpeg"}],"author":"Haider Pasha","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#article","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/"},"author":{"name":"admin","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"headline":"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis","datePublished":"2025-04-30T13:00:00+00:00","dateModified":"2025-06-06T15:58:28+00:00","mainEntityOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/"},"wordCount":1128,"commentCount":0,"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg","articleSection":["Staying Ahead of Evolving Threats","Third Party Risk Assessment"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/","name":"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis - Perspectives","isPartOf":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website"},"primaryImageOfPage":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage"},"image":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg","datePublished":"2025-04-30T13:00:00+00:00","dateModified":"2025-06-06T15:58:28+00:00","author":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977"},"description":"Third-party cyber risks are escalating, enterprise-wide threats.","breadcrumb":{"@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#primaryimage","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/04\/your-vendors-cyber-failure.jpg","width":1920,"height":840},{"@type":"BreadcrumbList","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/your-vendors-cyber-failure-will-become-your-next-crisis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/"},{"@type":"ListItem","position":2,"name":"Your Vendor\u2019s Cyber Failure Will Become Your Next Crisis"}]},{"@type":"WebSite","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#website","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/","name":"Perspectives","description":"What\u2019s next for business and technology innovators.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/fa04bcb7bc197e39dfef6232349f7977","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/#\/schema\/person\/image\/0058eff42c16830fc0b2a884d693ea44","url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","contentUrl":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-content\/uploads\/2025\/02\/panw_master-twitter-profile-pic-400x400-1-150x150.png","caption":"admin"},"sameAs":["http:\/\/localhost\/wordpress"],"url":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/2847","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/comments?post=2847"}],"version-history":[{"count":6,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/2847\/revisions"}],"predecessor-version":[{"id":3272,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/posts\/2847\/revisions\/3272"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media\/2848"}],"wp:attachment":[{"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/media?parent=2847"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/categories?post=2847"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/tags?post=2847"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-www.paloaltonetworks.sg\/perspectives\/wp-json\/wp\/v2\/coauthors?post=2847"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}