John, the headline-making attack against Solarwinds sent a shockwave through the world and had many security and business leaders reexamining the security of their own supply chains. In a supply chain – or third party - attack, criminals infiltrate and disrupt the computer systems of a company’s key suppliers or vendors and, through this third-party access, are then able to breach other organizations associated with the initial target.