Also published in CIO.com:
Why SoftBank's Pepper could become the iPhone of robots
x hide permanently

Do third-party vendors have a bullseye on their backs?

CIO.com

Because there are so many different kinds of third parties, identifying whether they do or don’t have the right infrastructure or security protocols can be a challenge. As so many organizations rely on a variety of different providers, third parties can become the gateways to the network. In order to mitigate the risk of a breach from a third party, enterprises need to design a vetting process and understand the language of the service-level agreemen in order to best evaluate their contracts.