Vulnerabilities in 3rd party JavaScript, appliances, libraries, and other dependencies make you vulnerable to attack. Create processes that check for updates daily and patch quickly. If the vendor is unable to keep their code updated, seek an alternative solution. #VendorRisks Featured image is a derivative work from the following images: https://www.pexels.com/photo/close-up-view-of-system-hacking-in-a-monitor-5380664/