Page 3 of 8 pages.
Identifying Cyber Vulnerabilities in Manufacturers Digital Supply Chain Networks
March 28, 2017
The fourth industrial revolution brings a new operational risk for smart manufacturers and digital supply networks: cyber, and in the age of Industry 4.0, cybersecurity strategies should be secure, vigilant, and resilient, as well as fully integrated into organizational strategy from the start.
New report highlights the opportunities and risks in the ongoing digital transformation
December 19, 2016
IDC releases predictions that suggest manufacturers slow to adapt will not survive, but leaders will also face a new set of challenges.
UL announces Cybersecurity Assurance Program for industrial control systems
September 22, 2016
Criteria to help assess software vulnerabilities, address known malware, review security controls and increase security awareness.
Symantec to Buy Blue Coat for $4.7 Billion to Boost Cybersecurity Enterprise Unit
June 13, 2016
With the acquisition of Blue Coat, Symantec will enhance its leadership position to define the future of cybersecurity and set the pace for innovation industrywide.
Heightened Supply Chain Security in the Shadow of Risk
May 17, 2016
Global supply chains are growing in complexity, yet remain vulnerable to myriad dangers damaging to both people and businesses.
Heightening Supply Chain Security
May 4, 2016
The New Paradigm and Best Practices to Manage Security.
Flags of Convenience continue to cause global security concerns
April 1, 2016
The potential abuse of flags of convenience has again been brought to center stage with a feature in the Financial Times that argues that global terrorism is exploiting weaknesses in supply chain tracking and tracing.
Apple vs. The FBI: What You Should Be Asking
February 24, 2016
Could the justice department be using this case about hacking into an iPhone so the majority of the people will be sympathetic to its cause about taking another shot at breaking encryption technology?
Mobile Security: Addressing the Evolving Threat
February 19, 2016
As mobile is intrinsically woven into the fabric of enterprise, mobile security is less about protecting data and devices and more about protecting intellectual property, brand value, and customer trust.
Facebook and Twitter Announce Support for Apple in Backdoor Dispute With FBI
February 19, 2016
While the government has suggested the software tool will be used to unlock only the device in question, Apple and other technology companies believe that it sets a precedent that could lead to similar unlocking requests in the future.
Super Bowl logistics and security concerns
February 3, 2016
With the Super Bowl coming to the San Francisco Bay Area this week security is bound to be top of mind that weekend, and you can expect a heightened level of vigilance on the waterfront.
Ports vulnerable to cyber attacks as well
November 12, 2015
Federal officials should forge a comprehensive strategy to defend the nation’s ports from cyber attacks, Port of Long Beach Director of Security Services Randy Parsons told a U.S. House of Representatives committee in testimony earlier this month.
Frost & Sullivan: Industrial cybersecurity market growing
September 30, 2015
Cybersecurity begins the 'inevitable shift' from a reactive operating model to a proactive design philosophy.
Airforwarders Association to address new security compliance issues
September 10, 2015
Targeting potentially dangerous air cargo is the focus and reason behind Pre-loading Advanced Cargo Information. How can freight forwarders get prepared?
Shipper compliance “refresher course” on deck
September 4, 2015
While shippers ready themselves for the long Labor Day weekend, we’d like to remind them that new security and compliance regulations are - as always – looming ahead.