A pattern has emerged in the wave of data breaches dominating the technology and mainstream press headlines over the past two years. In breach after breach, the primary attack vector for hackers to get access to the most sensitive enterprise applications was…other enterprise applications.
More specifically, the attack vector consisted of a few simple steps: