SC247    Topics    Technology    Security


Security Top Stories

It’s Time to Get Real About Cybersecurity
On this episode, Steven A. Melnyk discusses why cybersecurity needs to be at the top of every supply chain manager’s to do list.
Growing Cyber Threats Drive Need for Advanced Data Protection Defenses Investments
According to a newly released Oracle survey, policymakers and C-Suite executives believe the U.S. should invest more in advanced cybersecurity technology.
Blockchain is Vastly Overrated; Supply Chain Cybersecurity is Vastly Underrated
Cyber attacks are on the rise, especially in the supply chain, and while blockchain is not irrelevant to supply chain cyber security, technology alone will not completely solve the problem.
What’s Next for Better Network Performance?
Your business needs a network approach that can be as dynamic as your business and the times - one that can scale and meet you wherever you are now, and wherever you may go in the future.

Security Resources

Security in the Age of Artificial Intelligence
A report on the views and actions of C-Suite executives, policymakers and the public related to cybersecurity and...
Supply Chain Risk 2.0 – Understanding Supplier Networks and Supply Connections
To survive in today’s complex and inter-dependent supply chains, companies need supplier and material insight that allows...

Security News

2015 is Getting an Extra Second and that Could Be Problematic for The Internet
Today, June 30th 2015, at precisely 23:59:59, the world’s atomic clocks will pause for a single second, or, to be more precise, they’ll change to the uncharted time of 23:59:60 - before ticking over to the more worldly hour of 00:00:00 on the morning of July 1st, 2015.

Moving Integration and Interactions Forward in the Era of Digital Business
To adapt and grow in the digital economy, you need to be able to integrate, secure, manage and measure all of the data flows: new and old.

Helping Organizations Manage and Govern Complex Data Flows between Business Partners
Axway B2Bi provides organizations with new compliance, interoperability, business continuity and auditing capabilities.

How Things Have Changed After 30 Years of Dot Com
The international internet revolution began exactly 30 years ago on 15th March, 1985 and today we have millions of dot coms - our world wouldn't be the same without these dot coms, actually we cant imagine a world without them.

Tech CEOs Skip Obama Cybersecurity Summit
Some analysts say the big tech dogs are staying away because of tensions between the White House and Silicon Valley.

Edward Snowden Refuses to Use Apple’s iphone Over Spying Concerns
Edward Snowden reportedly believes that the iPhone contains "special software" that can be remotely activated by authorities for intelligence gathering purposes.

Edward Snowden: Cyber War More Damaging To US than Any Other Nation
The former NSA contractor sat down with NOVA to discuss why the US should allocate more resources to defensive maneuvering in cyberspace than towards offensive capabilities.

The Imperative for Effective Data Flow Governance in Response to Data Security
The Imperative for Effective Data Flow Governance in Response to Data Security, Risk Mitigation, and Compliance Requirements - Understanding how managed file transfer and API management support changes in integration strategy.

‘Bring Your Own Internet of Things’ Coming To Businesses In 2015
So what technological marvels can we expect to see this year? Mark O’Neill, VP of innovation at Axway, provides his predictions for 2015, which include Bring Your Own Internet of Things, B2B in the cloud, and connected vehicles.

Managed File Transfer Mitigates Risk of Data Breaches & Non-Compliance Regulatory Mandates
Many IT leaders have so far failed to see the big picture and do not pay due attention to the need to govern the flow of data within, at, and beyond the edge of the enterprise.

Enterprise IT Insights for the Internet of Things
A timely reminder of the risks presented by the emerging IoT, what enterprise IT has done in the past to overcome similar issues, and how security approaches need to change to accommodate today's level of connectivity.

5 Ways to Gain end-to-end Visibility Across Data Flows
In any business interaction, data is a living, breathing thing. Whether it supports an order, a claim, or a payment transaction; represents your products and services; or actually is your product or service, every bit of information drives a business process lifecycle that has a beginning and an end.

Mobile Threats, Made to Measure
When it comes to malware, people who use trusted, mainstream app stores (as the bulk of users in the US and Western Europe do) are less likely to encounter malware.

Cyber Attacks Targeting Smartphone Supply Chains
A new mobile trojan dubbed “DeathRing” is being pre-loaded on to smartphones somewhere in the supply chain, warn researchers at mobile security firm Lookout.

Regin: Top-Tier Espionage Tool Enables Stealthy Surveillance
Regin is an extremely complex piece of software that can be customized with a wide range of different capabilities that can be deployed depending on the target.

Regin, a New Computer Spying Bug Discovered
The bug was probably created by a government and has been used for six years against a range of targets around the world and is one of the most sophisticated pieces of malicious software ever seen.

China Suspected of U.S. Postal Service Hack
The U.S. Postal Service said today it is the victim of a cyberattack and that information about its employees, including Social Security numbers, may have been compromised.

Anatomy of the Attack: Zombie Zero
TrapX 360 platform is uniquely positioned to detect, analyze, and report on Zero Day and APT threats in real time in a completely automated framework.

Malware Hidden In Chinese Inventory Scanners Targeting Logistics and Shipping Companies
TrapX discovers ‘Zombie Zero’ advanced persistent malware - Made in China; state sponsored attack targeting shipping and logistics industry worldwide.

The Supply Chain Silent Threat – Cyber Attack
High-value cyberspace attacks can change the status quo. Whether they involve stealing the blueprints for a new aircraft design or disrupting the supply of electrical power, all of them have one weakness in common – the supply chain.

Featured Companies

FlytBase provides drone agnostic software solutions to automate and scale drone operations. It is the world’s first Internet of Drones Platform (IoD), that allows easy deployment of intelligent drone fleets, connected with cloud-based business applications. FlytBase leverages its IoD…
When we first got started, smartphones barely existed– now there are more than a billion shipped each year and hundreds of millions in our enterprises. Before everything and everyone went mobile, we knew it was going to change computing forever.…
Elementum is the company behind the first cloud-native supply chain automation platform. In an age where instant gratification is the new norm and customer expectations are continuing to grow exponentially, successful operations need to adapt faster than ever to unplanned…
Diversity Limited
Ben Kepes – Founder and Principal. Ben Kepes is a technology evangelist, an invester, a commentator and a business adviser. His business interests include a diverse range of industries from manufacturing to property to technology. As a technology commentator he has…
Adobe is the global leader in digital media and digital marketing solutions. Our creative, marketing and document solutions empower everyone – from emerging artists to global brands – to bring digital creations to life and deliver immersive, compelling experiences to the right…
Youredi is the leading provider of data integration and analytics solutions as a service for global eCommerce, finance and logistics. With its simple, cost-effective iPaaS that can be delivered quickly and securely from the cloud and can compliment your existing…
Esri inspires and enables people to positively impact their future through a deeper, geographic understanding of the changing world around them. Esri has cultivated collaborative relationships with partners who share our commitment to solving Earth’s most pressing challenges with…
Raytheon Company, with 2014 sales of $23 billion and 61,000 employees worldwide, is a technology and innovation leader specializing in defense, civil government and cybersecurity markets throughout the world. With a history of innovation spanning 93 years, Raytheon provides state-of-the-art electronics, mission systems integration…
Dyn is a cloud-based Internet Performance Management (IPM) company that provides unrivaled visibility and control into cloud and public Internet resources. Dyn’s platform monitors, controls and optimizes applications and infrastructure through Data, Analytics, and Traffic Steering, ensuring traffic gets…
World Wide Web Foundation
The World Wide Web Foundation was established in 2009 by Web inventor Sir Tim Berners-Lee to tackle the fundamental obstacles to realizing his vision of an open Web available, usable and valuable for everyone.
All Security Companies
All Companies

Featured Downloads

Rapidly Improve the Performance of Your Warehouse Logistics
Rapidly Improve the Performance of Your Warehouse Logistics
The Rapid Performance Evaluation identifies opportunities and potential improvements in every aspect of warehouse logistics operations; performance, productivity, service, quality, and systems.
Resource Management System (RMS): How to Effectively Leverage Your Assets
Resource Management System (RMS): How to Effectively Leverage Your Assets
This guide provides an in-depth analysis of the potential of various resources available in a warehouse and how they can be utilized...

Sustainable Supply Chain Insights From PITT OHIO
Sustainable Supply Chain Insights From PITT OHIO
A whitepaper on supply chain insights gleaned at the LEED-certified gold Cleveland transportation and sustainability summit.
20 Warehouse & Distribution Center Best Practices for Your Supply Chain
20 Warehouse & Distribution Center Best Practices for Your Supply Chain
In this guide, we picked the brains of our supply chain engineers to find ways to improve warehouse and distribution center efficiency...
SOLOCHAIN WMS plus a Guide to Warehouse Management Systems
SOLOCHAIN WMS plus a Guide to Warehouse Management Systems
In these 2 'papers' Solochain WMS, we detail Manufacturing Execution System capabilities and Generix's portfolio of SCM solutions to manage all distribution logistics,...