SC247    Topics    Technology    Security

Security


Security Top Stories

It’s Time to Get Real About Cybersecurity
On this episode, Steven A. Melnyk discusses why cybersecurity needs to be at the top of every supply chain manager’s to do list.
Growing Cyber Threats Drive Need for Advanced Data Protection Defenses Investments
According to a newly released Oracle survey, policymakers and C-Suite executives believe the U.S. should invest more in advanced cybersecurity technology.
Blockchain is Vastly Overrated; Supply Chain Cybersecurity is Vastly Underrated
Cyber attacks are on the rise, especially in the supply chain, and while blockchain is not irrelevant to supply chain cyber security, technology alone will not completely solve the problem.
What’s Next for Better Network Performance?
Your business needs a network approach that can be as dynamic as your business and the times - one that can scale and meet you wherever you are now, and wherever you may go in the future.

Security Resources

Security in the Age of Artificial Intelligence
A report on the views and actions of C-Suite executives, policymakers and the public related to cybersecurity and...
Supply Chain Risk 2.0 – Understanding Supplier Networks and Supply Connections
To survive in today’s complex and inter-dependent supply chains, companies need supplier and material insight that allows...


Security News

It’s Time to Get Real About Cybersecurity
On this episode, Steven A. Melnyk discusses why cybersecurity needs to be at the top of every supply chain manager’s to do list.

Growing Cyber Threats Drive Need for Advanced Data Protection Defenses Investments
According to a newly released Oracle survey, policymakers and C-Suite executives believe the U.S. should invest more in advanced cybersecurity technology.

Blockchain is Vastly Overrated; Supply Chain Cybersecurity is Vastly Underrated
Cyber attacks are on the rise, especially in the supply chain, and while blockchain is not irrelevant to supply chain cyber security, technology alone will not completely solve the problem.

Security in the Age of Artificial Intelligence
A report on the views and actions of C-Suite executives, policymakers and the public related to cybersecurity and data protection in today’s threat-filled world.

Supply Chain Risk 2.0 – Understanding Supplier Networks and Supply Connections
To survive in today’s complex and inter-dependent supply chains, companies need supplier and material insight that allows them to fully understand and act upon shifts in the market, mitigate cost risk, and ensure business continuity.

Enable Your Business to Be More Agile with Ethernet
This paper describes how upgrading your network to Ethernet, you get a single, simplified network that allows you to integrate the latest technologies, maximize employee collaboration, and prioritize decision-making.

What’s Next for Better Network Performance?
Your business needs a network approach that can be as dynamic as your business and the times - one that can scale and meet you wherever you are now, and wherever you may go in the future.

Top 5 Myths about Cybersecurity Uncovered
Despite cybersecurity being such a burning topic, there are still several questions and assumptions surrounding it that disallow organizations from truly arming themselves against cyber attacks.

FedEx’s TNT Unit Suffering from June Cyberattack
FedEx Corp.’s TNT unit is still trudging through some transactions by hand and information systems may never fully recover from a June Petya cyberattack that is expected to deal a blow to earnings.

Industry 4.0 and Cyber Risk: Security in an Age of Connected Production
In this paper, we examine the modern connected digital supply networks, smart factories, and connected devices, focusing on the unique cyber risks faced by each, we proactively integrate cybersecurity into an overall strategy in the age of Industry 4.0.

Massive Cyber Attack Hits Businesses Worldwide
A massive cyber-attack using tools believed to have been developed by the US National Security Agency has struck organizations around the world, including the USA, UK, Spain, Russia, China, Portugal and Sweden, experts say it may be the biggest ransomware attack ever observed.

Identifying Cyber Vulnerabilities in Manufacturers Digital Supply Chain Networks
The fourth industrial revolution brings a new operational risk for smart manufacturers and digital supply networks: cyber, and in the age of Industry 4.0, cybersecurity strategies should be secure, vigilant, and resilient, as well as fully integrated into organizational strategy from the start.

Symantec to Buy Blue Coat for $4.7 Billion to Boost Cybersecurity Enterprise Unit
With the acquisition of Blue Coat, Symantec will enhance its leadership position to define the future of cybersecurity and set the pace for innovation industrywide.

Apple vs. The FBI: What You Should Be Asking
Could the justice department be using this case about hacking into an iPhone so the majority of the people will be sympathetic to its cause about taking another shot at breaking encryption technology?

Mobile Security: Addressing the Evolving Threat
As mobile is intrinsically woven into the fabric of enterprise, mobile security is less about protecting data and devices and more about protecting intellectual property, brand value, and customer trust.

Facebook and Twitter Announce Support for Apple in Backdoor Dispute With FBI
While the government has suggested the software tool will be used to unlock only the device in question, Apple and other technology companies believe that it sets a precedent that could lead to similar unlocking requests in the future.

Mobile Malware Report for Q1 2015
G DATA’s latest malware report finds almost 5,000 new mobile malware strains appear every day.

Malware Raises Security Risks in Supply Chain
Security experts are increasingly worried about the security of the supply chain with reports of more than 20 incidents where rogue retailers have managed to pre-install malware on new Android phones.

Effective Strategies for Mitigating the Risks of Counterfeit Parts
Counterfeit parts will remain a thorny challenge for the electronics supply chain. However, a disciplined, structured approach can help your company mitigate the risk of counterfeits.

Cisco Announces Intent to Acquire OpenDNS
Acquisition to accelerate Cisco's cloud delivered security portfolio as cyber attacks increase in number and sophistication - OpenDNS provides advanced threat protection for any device, anywhere, anytime.


Featured Companies

Esri
Esri inspires and enables people to positively impact their future through a deeper, geographic understanding of the changing world around them. Esri has cultivated collaborative relationships with partners who share our commitment to solving Earth’s most pressing challenges with…
DroneShield
Our drone detection and warning system accelerates the apprehension and prosecution of violators through real-time alerts and digital evidence collection.
Bain and Company
Bain & Company serves global clients on issues of strategy, operations, technology, organization, and mergers and acquisitions.
Frontier Business
We’re not just a provider, we’re your partner. At Frontier, we get to know your business and offer you tailored solutions designed to meet your demands and continued growth. Solving real business problems with tailored network solutions, so…
Dyn
Dyn is a cloud-based Internet Performance Management (IPM) company that provides unrivaled visibility and control into cloud and public Internet resources. Dyn’s platform monitors, controls and optimizes applications and infrastructure through Data, Analytics, and Traffic Steering, ensuring traffic gets…
Ramco Systems
Ramco Systems is part of the USD 1 Billion diversified conglomerate, the Ramco Group of companies. While there are multiple shippers focused ERP applications, Ramco Logistics ERP Software is BUILT EXCLUSIVELY FOR Logistics Service Providers. The ERP Suite is a single-platform,…
The Broadband Commission
I​TU and UNESCO set up the Broadband Commission for Digital Development in response to UN Secretary-General Ban Ki-Moon’s call to step up UN efforts to meet the Millennium Development Goals (MDGs). The Commission was established in May 2010, five…
HumanAI
HumanAI is a decentralized data exchange system that protects and monetizes personal data to enable global user-centric artificial intelligence.
TrapX
TrapX is a leading provider of cloud-based and on-premises cyber-security solutions. Some of the world’s leading Global 2000 enterprises serving the financial services, national critical infrastructure, retail, healthcare, pharmaceutical, and other industries rely on TrapX to strengthen their IT ecosystems…
Modulo
Modulo is the leading global provider of Governance, Risk Management, and Compliance (GRC) and Smart Government solutions. Over 1,000 customers globally leverage Modulo to monitor IT risk through automated workflow; report compliance against industry regulations, standards, and policies; prioritize operational risk…
All Security Companies
All Companies
 


Featured Downloads

Practices and Benefits of Collaborative Supply Management
Practices and Benefits of Collaborative Supply Management
To improve Supply Chain performance, the time has come for those involved to collaborate and pool their resources, see the details in...
TMS+ Go Beyond Transport to Optimize Cost, Service, & Resiliency
TMS+ Go Beyond Transport to Optimize Cost, Service, & Resiliency
In this paper, we discuss why a holistic, “TMS+” approach is integral to success in the new normal and beyond, outline how...

Best Practices for Selecting the Optimal Order Management System (OMS)
Best Practices for Selecting the Optimal Order Management System (OMS)
In this best practices paper we take a look at what omnichannel executives need to know before, during and after selection to...
Supplier Management Automation
Supplier Management Automation
This ebook is for accounts payable (AP) and procurement professionals looking to leverage AI-driven supplier management automation to improve cashflow, strengthen supplier...
How Roaming Shuttles Improve Order Fulfillment Operations
How Roaming Shuttles Improve Order Fulfillment Operations
Implementing this goods-to-person automated storage and retrieval technology improves customer experience, optimizes operations, and maximizes profitability.
{/exp:switchee}