Security News
Modern Strategies for Navigating Check Fraud in Today’s World
Don't fall victim to the rise of check fraud. Protect your business with JAGGAER Pay's innovative solutions. Download our free guide today!
Strategies for Keeping your Company Safe from Cyber Fraud in 2024
Looking ahead to 2024, it is crucial for businesses to take proactive measures to protect themselves against AP fraud. This blog post will provide valuable insights into AP fraud prevention, offering five tips to safeguard your company’s finances.
Safeguarding Growth: The Cybersecurity Challenges of a Digital Supply Chain
Complex digital supply chains spanning multiple countries and continents offer invaluable flexibility and cost efficiencies, but also growing cybersecurity risks.
Combatting Supply Chain Fraud Requires a Multi-Faceted Strategy
Fraud remains a concern among carriers, shippers and 3PLs, but fighting back remains a complex and time-consuming process.
It’s Time to Get Real About Cybersecurity
On this episode, Steven A. Melnyk discusses why cybersecurity needs to be at the top of every supply chain manager’s to do list.
Growing Cyber Threats Drive Need for Advanced Data Protection Defenses Investments
According to a newly released Oracle survey, policymakers and C-Suite executives believe the U.S. should invest more in advanced cybersecurity technology.
Blockchain is Vastly Overrated; Supply Chain Cybersecurity is Vastly Underrated
Cyber attacks are on the rise, especially in the supply chain, and while blockchain is not irrelevant to supply chain cyber security, technology alone will not completely solve the problem.
Security in the Age of Artificial Intelligence
A report on the views and actions of C-Suite executives, policymakers and the public related to cybersecurity and data protection in today’s threat-filled world.
Supply Chain Risk 2.0 – Understanding Supplier Networks and Supply Connections
To survive in today’s complex and inter-dependent supply chains, companies need supplier and material insight that allows them to fully understand and act upon shifts in the market, mitigate cost risk, and ensure business continuity.
Enable Your Business to Be More Agile with Ethernet
This paper describes how upgrading your network to Ethernet, you get a single, simplified network that allows you to integrate the latest technologies, maximize employee collaboration, and prioritize decision-making.
What’s Next for Better Network Performance?
Your business needs a network approach that can be as dynamic as your business and the times - one that can scale and meet you wherever you are now, and wherever you may go in the future.
Top 5 Myths about Cybersecurity Uncovered
Despite cybersecurity being such a burning topic, there are still several questions and assumptions surrounding it that disallow organizations from truly arming themselves against cyber attacks.
FedEx’s TNT Unit Suffering from June Cyberattack
FedEx Corp.’s TNT unit is still trudging through some transactions by hand and information systems may never fully recover from a June Petya cyberattack that is expected to deal a blow to earnings.
Industry 4.0 and Cyber Risk: Security in an Age of Connected Production
In this paper, we examine the modern connected digital supply networks, smart factories, and connected devices, focusing on the unique cyber risks faced by each, we proactively integrate cybersecurity into an overall strategy in the age of Industry 4.0.
Massive Cyber Attack Hits Businesses Worldwide
A massive cyber-attack using tools believed to have been developed by the US National Security Agency has struck organizations around the world, including the USA, UK, Spain, Russia, China, Portugal and Sweden, experts say it may be the biggest ransomware attack ever observed.
Identifying Cyber Vulnerabilities in Manufacturers Digital Supply Chain Networks
The fourth industrial revolution brings a new operational risk for smart manufacturers and digital supply networks: cyber, and in the age of Industry 4.0, cybersecurity strategies should be secure, vigilant, and resilient, as well as fully integrated into organizational strategy from the start.
Symantec to Buy Blue Coat for $4.7 Billion to Boost Cybersecurity Enterprise Unit
With the acquisition of Blue Coat, Symantec will enhance its leadership position to define the future of cybersecurity and set the pace for innovation industrywide.
Apple vs. The FBI: What You Should Be Asking
Could the justice department be using this case about hacking into an iPhone so the majority of the people will be sympathetic to its cause about taking another shot at breaking encryption technology?
Mobile Security: Addressing the Evolving Threat
As mobile is intrinsically woven into the fabric of enterprise, mobile security is less about protecting data and devices and more about protecting intellectual property, brand value, and customer trust.
Facebook and Twitter Announce Support for Apple in Backdoor Dispute With FBI
While the government has suggested the software tool will be used to unlock only the device in question, Apple and other technology companies believe that it sets a precedent that could lead to similar unlocking requests in the future.
Featured Companies
Supply chain management solutions from IBM deliver supply chain planning and execution capabilities across the extended enterprise, enabling companies to anticipate, control and react to demand and supply volatility within the supply chain. Managing how and where you fulfill orders,…
Infosys is a global leader in technology and consulting services. We enable clients in more than 50 countries to create and execute strategies for their digital transformation. From engineering to application development, knowledge management and business process management, we help our…
Raytheon Company, with 2014 sales of $23 billion and 61,000 employees worldwide, is a technology and innovation leader specializing in defense, civil government and cybersecurity markets throughout the world. With a history of innovation spanning 93 years, Raytheon provides state-of-the-art electronics, mission systems integration…
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to thenetwork.cisco.com.
Modulo is the leading global provider of Governance, Risk Management, and Compliance (GRC) and Smart Government solutions. Over 1,000 customers globally leverage Modulo to monitor IT risk through automated workflow; report compliance against industry regulations, standards, and policies; prioritize operational risk…
Ben Kepes – Founder and Principal. Ben Kepes is a technology evangelist, an invester, a commentator and a business adviser. His business interests include a diverse range of industries from manufacturing to property to technology. As a technology commentator he has…
Symantec Corporation is an information protection expert that helps people, businesses and governments seeking the freedom to unlock the opportunities technology brings - anytime, anywhere. Founded in April 1982, Symantec, a Fortune 500 company, operating one of the largest global data-intelligence networks,…
As a technology staffing firm, we can’t think of a more fitting mantra. We’re extreme believers in technology and the incredible things it can do. But we know that behind every smart piece of software, every powerful processor,…
At Microsoft, our mission is to empower every person and every organization on the planet to achieve more. Our mission is grounded in both the world in which we live and the future we strive to create. Today, we live…
Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right…
All Security Companies
All Companies