SC247    Topics    Technology    Security

Security


Security Top Stories

Safeguarding Growth: The Cybersecurity Challenges of a Digital Supply Chain
Complex digital supply chains spanning multiple countries and continents offer invaluable flexibility and cost efficiencies, but also growing cybersecurity risks.
Combatting Supply Chain Fraud Requires a Multi-Faceted Strategy
Fraud remains a concern among carriers, shippers and 3PLs, but fighting back remains a complex and time-consuming process.
It’s Time to Get Real About Cybersecurity
On this episode, Steven A. Melnyk discusses why cybersecurity needs to be at the top of every supply chain manager’s to do list.
Growing Cyber Threats Drive Need for Advanced Data Protection Defenses Investments
According to a newly released Oracle survey, policymakers and C-Suite executives believe the U.S. should invest more in advanced cybersecurity technology.

Security Resources

Security in the Age of Artificial Intelligence
A report on the views and actions of C-Suite executives, policymakers and the public related to cybersecurity and...
Supply Chain Risk 2.0 – Understanding Supplier Networks and Supply Connections
To survive in today’s complex and inter-dependent supply chains, companies need supplier and material insight that allows...


Security News

Facebook and Twitter Announce Support for Apple in Backdoor Dispute With FBI
While the government has suggested the software tool will be used to unlock only the device in question, Apple and other technology companies believe that it sets a precedent that could lead to similar unlocking requests in the future.

Mobile Malware Report for Q1 2015
G DATA’s latest malware report finds almost 5,000 new mobile malware strains appear every day.

Malware Raises Security Risks in Supply Chain
Security experts are increasingly worried about the security of the supply chain with reports of more than 20 incidents where rogue retailers have managed to pre-install malware on new Android phones.

Effective Strategies for Mitigating the Risks of Counterfeit Parts
Counterfeit parts will remain a thorny challenge for the electronics supply chain. However, a disciplined, structured approach can help your company mitigate the risk of counterfeits.

Cisco Announces Intent to Acquire OpenDNS
Acquisition to accelerate Cisco's cloud delivered security portfolio as cyber attacks increase in number and sophistication - OpenDNS provides advanced threat protection for any device, anywhere, anytime.

2015 is Getting an Extra Second and that Could Be Problematic for The Internet
Today, June 30th 2015, at precisely 23:59:59, the world’s atomic clocks will pause for a single second, or, to be more precise, they’ll change to the uncharted time of 23:59:60 - before ticking over to the more worldly hour of 00:00:00 on the morning of July 1st, 2015.

Moving Integration and Interactions Forward in the Era of Digital Business
To adapt and grow in the digital economy, you need to be able to integrate, secure, manage and measure all of the data flows: new and old.

Helping Organizations Manage and Govern Complex Data Flows between Business Partners
Axway B2Bi provides organizations with new compliance, interoperability, business continuity and auditing capabilities.

How Things Have Changed After 30 Years of Dot Com
The international internet revolution began exactly 30 years ago on 15th March, 1985 and today we have millions of dot coms - our world wouldn't be the same without these dot coms, actually we cant imagine a world without them.

Tech CEOs Skip Obama Cybersecurity Summit
Some analysts say the big tech dogs are staying away because of tensions between the White House and Silicon Valley.

Edward Snowden Refuses to Use Apple’s iphone Over Spying Concerns
Edward Snowden reportedly believes that the iPhone contains "special software" that can be remotely activated by authorities for intelligence gathering purposes.

Edward Snowden: Cyber War More Damaging To US than Any Other Nation
The former NSA contractor sat down with NOVA to discuss why the US should allocate more resources to defensive maneuvering in cyberspace than towards offensive capabilities.

The Imperative for Effective Data Flow Governance in Response to Data Security
The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements - Understanding how managed file transfer and API management support changes in integration strategy.

‘Bring Your Own Internet of Things’ Coming To Businesses In 2015
So what technological marvels can we expect to see this year? Mark O’Neill, VP of innovation at Axway, provides his predictions for 2015, which include Bring Your Own Internet of Things, B2B in the cloud, and connected vehicles.

Managed File Transfer Mitigates Risk of Data Breaches & Non-Compliance Regulatory Mandates
Many IT leaders have so far failed to see the big picture and do not pay due attention to the need to govern the flow of data within, at, and beyond the edge of the enterprise.

Enterprise IT Insights for the Internet of Things
A timely reminder of the risks presented by the emerging IoT, what enterprise IT has done in the past to overcome similar issues, and how security approaches need to change to accommodate today's level of connectivity.

5 Ways to Gain end-to-end Visibility Across Data Flows
In any business interaction, data is a living, breathing thing. Whether it supports an order, a claim, or a payment transaction; represents your products and services; or actually is your product or service, every bit of information drives a business process lifecycle that has a beginning and an end.

Mobile Threats, Made to Measure
When it comes to malware, people who use trusted, mainstream app stores (as the bulk of users in the US and Western Europe do) are less likely to encounter malware.

Cyber Attacks Targeting Smartphone Supply Chains
A new mobile trojan dubbed “DeathRing” is being pre-loaded on to smartphones somewhere in the supply chain, warn researchers at mobile security firm Lookout.

Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
Regin is an extremely complex piece of software that can be customized with a wide range of different capabilities that can be deployed depending on the target.


Featured Companies

HumanAI
HumanAI is a decentralized data exchange system that protects and monetizes personal data to enable global user-centric artificial intelligence.
TrapX
TrapX is a leading provider of cloud-based and on-premises cyber-security solutions. Some of the world’s leading Global 2000 enterprises serving the financial services, national critical infrastructure, retail, healthcare, pharmaceutical, and other industries rely on TrapX to strengthen their IT ecosystems…
DroneShield
Our drone detection and warning system accelerates the apprehension and prosecution of violators through real-time alerts and digital evidence collection.
Ericsson
Ericsson is the driving force behind the Networked Society - a world leader in communications technology and services. Our long-term relationships with every major telecom operator in the world allow people, business and society to fulfill their potential and create…
Lookout
When we first got started, smartphones barely existed– now there are more than a billion shipped each year and hundreds of millions in our enterprises. Before everything and everyone went mobile, we knew it was going to change computing forever.…
Bain and Company
Bain & Company serves global clients on issues of strategy, operations, technology, organization, and mergers and acquisitions.
Microsoft
At Microsoft, our mission is to empower every person and every organization on the planet to achieve more. Our mission is grounded in both the world in which we live and the future we strive to create. Today, we live…
Axway
Axway is a market leader in governing the flow of data, is a global software and services company with more than 11,000 public- and private-sector customers in 100 countries. For more than a decade, Axway has empowered the world’s top organizations…
Cisco
Cisco is the worldwide leader in IT that helps companies seize the opportunities of tomorrow by proving that amazing things can happen when you connect the previously unconnected. For ongoing news, please go to thenetwork.cisco.com.
Youredi
Youredi is the leading provider of data integration and analytics solutions as a service for global eCommerce, finance and logistics. With its simple, cost-effective iPaaS that can be delivered quickly and securely from the cloud and can compliment your existing…
All Security Companies
All Companies
 


Featured Downloads

The Ultimate WMS Checklist: Find the Perfect Fit
The Ultimate WMS Checklist: Find the Perfect Fit
Warehouse Management System selection requires time, research and diligent planning. In order to help you, Made4net has published this whitepaper to...
GEP Procurement & Supply Chain Tech Trends Report 2024
GEP Procurement & Supply Chain Tech Trends Report 2024
We’ve researched the five biggest trends in the supply chain space this year, and, drawing on our expertise in procurement and...

Unified Control System - Intelligent Warehouse Orchestration
Unified Control System - Intelligent Warehouse Orchestration
Download this whitepaper to learn Unified Control System (UCS), designed to orchestrate automated and human workflows across the warehouse, enabling automation technologies...
An Inside Look at Dropshipping
An Inside Look at Dropshipping
Korber Supply Chain’s introduction to the world of dropshipping. While dropshipping is not for every retailer or distributor, it does provide...
C3 Solutions Major Trends for Yard and Dock Management in 2024
C3 Solutions Major Trends for Yard and Dock Management in 2024
What trends you should be focusing on in 2024 depends on how far you are on your yard and dock management journey. This...
{/exp:switchee}