(Source: Dark Reading) Each interaction with a third party needs multiple security controls, and the eventual dependency chain carries the risk of being as strong as its weakest link. This third-party risk also applies to software, in the form of vulnerable open source libraries. Similar in nature to server dependencies, vulnerable application …