Security News
The Crucial Importance of SOC 2 Certification in Today’s Digital Landscape
In our interconnected digital world, where data breaches are not just a risk but a daily headline, the importance of robust security measures cannot be overstated. One critical benchmark for assessing the trustworthiness of service providers, particularly those handling customer data, is SOC 2 certification. If your provider is not SOC 2 certified, your data may be at risk.
Modern Strategies for Navigating Check Fraud in Today’s World
Don't fall victim to the rise of check fraud. Protect your business with JAGGAER Pay's innovative solutions. Download our free guide today!
Strategies for Keeping your Company Safe from Cyber Fraud in 2024
Looking ahead to 2024, it is crucial for businesses to take proactive measures to protect themselves against AP fraud. This blog post will provide valuable insights into AP fraud prevention, offering five tips to safeguard your company’s finances.
Safeguarding Growth: The Cybersecurity Challenges of a Digital Supply Chain
Complex digital supply chains spanning multiple countries and continents offer invaluable flexibility and cost efficiencies, but also growing cybersecurity risks.
Combatting Supply Chain Fraud Requires a Multi-Faceted Strategy
Fraud remains a concern among carriers, shippers and 3PLs, but fighting back remains a complex and time-consuming process.
It’s Time to Get Real About Cybersecurity
On this episode, Steven A. Melnyk discusses why cybersecurity needs to be at the top of every supply chain manager’s to do list.
Growing Cyber Threats Drive Need for Advanced Data Protection Defenses Investments
According to a newly released Oracle survey, policymakers and C-Suite executives believe the U.S. should invest more in advanced cybersecurity technology.
Blockchain is Vastly Overrated; Supply Chain Cybersecurity is Vastly Underrated
Cyber attacks are on the rise, especially in the supply chain, and while blockchain is not irrelevant to supply chain cyber security, technology alone will not completely solve the problem.
Security in the Age of Artificial Intelligence
A report on the views and actions of C-Suite executives, policymakers and the public related to cybersecurity and data protection in today’s threat-filled world.
Supply Chain Risk 2.0 – Understanding Supplier Networks and Supply Connections
To survive in today’s complex and inter-dependent supply chains, companies need supplier and material insight that allows them to fully understand and act upon shifts in the market, mitigate cost risk, and ensure business continuity.
Enable Your Business to Be More Agile with Ethernet
This paper describes how upgrading your network to Ethernet, you get a single, simplified network that allows you to integrate the latest technologies, maximize employee collaboration, and prioritize decision-making.
What’s Next for Better Network Performance?
Your business needs a network approach that can be as dynamic as your business and the times - one that can scale and meet you wherever you are now, and wherever you may go in the future.
Top 5 Myths about Cybersecurity Uncovered
Despite cybersecurity being such a burning topic, there are still several questions and assumptions surrounding it that disallow organizations from truly arming themselves against cyber attacks.
FedEx’s TNT Unit Suffering from June Cyberattack
FedEx Corp.’s TNT unit is still trudging through some transactions by hand and information systems may never fully recover from a June Petya cyberattack that is expected to deal a blow to earnings.
Industry 4.0 and Cyber Risk: Security in an Age of Connected Production
In this paper, we examine the modern connected digital supply networks, smart factories, and connected devices, focusing on the unique cyber risks faced by each, we proactively integrate cybersecurity into an overall strategy in the age of Industry 4.0.
Massive Cyber Attack Hits Businesses Worldwide
A massive cyber-attack using tools believed to have been developed by the US National Security Agency has struck organizations around the world, including the USA, UK, Spain, Russia, China, Portugal and Sweden, experts say it may be the biggest ransomware attack ever observed.
Identifying Cyber Vulnerabilities in Manufacturers Digital Supply Chain Networks
The fourth industrial revolution brings a new operational risk for smart manufacturers and digital supply networks: cyber, and in the age of Industry 4.0, cybersecurity strategies should be secure, vigilant, and resilient, as well as fully integrated into organizational strategy from the start.
Symantec to Buy Blue Coat for $4.7 Billion to Boost Cybersecurity Enterprise Unit
With the acquisition of Blue Coat, Symantec will enhance its leadership position to define the future of cybersecurity and set the pace for innovation industrywide.
Apple vs. The FBI: What You Should Be Asking
Could the justice department be using this case about hacking into an iPhone so the majority of the people will be sympathetic to its cause about taking another shot at breaking encryption technology?
Mobile Security: Addressing the Evolving Threat
As mobile is intrinsically woven into the fabric of enterprise, mobile security is less about protecting data and devices and more about protecting intellectual property, brand value, and customer trust.
Featured Companies
The Okta identity management service provides directory services, single sign-on, strong authentication, provisioning, workflow, and built in reporting. Okta runs in the cloud on a secure, reliable, extensively audited platform that integrates deeply with on premises applications, directories, and identity…
Supply chain management solutions from IBM deliver supply chain planning and execution capabilities across the extended enterprise, enabling companies to anticipate, control and react to demand and supply volatility within the supply chain. Managing how and where you fulfill orders,…
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to thenetwork.cisco.com.
TrapX is a leading provider of cloud-based and on-premises cyber-security solutions. Some of the world’s leading Global 2000 enterprises serving the financial services, national critical infrastructure, retail, healthcare, pharmaceutical, and other industries rely on TrapX to strengthen their IT ecosystems…
Raytheon Company, with 2014 sales of $23 billion and 61,000 employees worldwide, is a technology and innovation leader specializing in defense, civil government and cybersecurity markets throughout the world. With a history of innovation spanning 93 years, Raytheon provides state-of-the-art electronics, mission systems integration…
Our drone detection and warning system accelerates the apprehension and prosecution of violators through real-time alerts and digital evidence collection.
Everbridge, Inc. is a global software company that provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to Keep People Safe and Businesses Running™. Everbridge’s Unified Critical Events Management Platform delivers secure,…
Mercado connects your global supply with your global demand - creating solutions that shine bright lights in the dark corners of the supply chain.
Youredi is the leading provider of data integration and analytics solutions as a service for global eCommerce, finance and logistics. With its simple, cost-effective iPaaS that can be delivered quickly and securely from the cloud and can compliment your existing…
Founded in 1998, Tribridge is a leading IT services provider dedicated to helping customers leverage cloud and on-premise business solutions to become more productive, profitable, competitive and secure. Specializing in Microsoft Dynamics CRM and ERP, SharePoint and other essential productivity solutions,…
All Security Companies
All Companies