Remove customer-security-policy
article thumbnail

10 must ask supply chain data security questions

Kinaxis

It could ruin your credibility with your customers. In 2013, Target, one of the largest retailers in the US, fell victim to a massive data breach when a cyber intruder stole credit and debit card information on more than 40 million customers and personal details like addresses, phone numbers and email addresses of 70 million customers.

Security 329
article thumbnail

Leveraging the Seismic Shifts in the Global Regulatory Landscape

The Logistics & Supply Chain Management Society

Nations are regularly remapping their foreign policies while entire industries are rethinking how they do business across borders. These changes are heavily weighing on how countries are viewing their national and economic security which in turn is reflecting in the changes in the global regulatory landscape.

Global 234
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Supply Chain Resilience. Really?

Supply Chain Shaman

In addition, the Council will conduct a supply chain review by December 31, 2024, to evaluate the impact of the supply chain on National Security Lora’s Take I think that we need to be skeptical without getting political. Background The Council of Supply Chain Resilience met for the first time this month. Think this is possible?

article thumbnail

Navigating the Supply Chain: The Crucial Role of Mobile Device Management Software

AB&R

Amidst this complexity, the adoption of Mobile Device Management (MDM) software emerges as a beacon of efficiency and security, particularly within supply chain warehouses. This data includes customer information, inventory details, and logistical plans, all of which are critical to the smooth functioning of the operation.

article thumbnail

Rail 101 with Ian Jefferies

The Logistics of Logistics

Ian is the President and Chief Executive Officer of the Association of American Railroads (AAR) which is the world’s leading railroad policy, research, standard setting, and technology organization that focuses on the safety and productivity of the U.S. From 2009 to 2013, Jefferies served as a senior policy advisor to the Chairman of the U.S.

article thumbnail

Two-Factor Authentication: How It Makes IT Access in Logistics Secure?

SCMDOJO

With the rise of technology, logistics became more automated and digitized, bringing increased security risks to the flow of goods. Compromised security can disrupt and negatively affect the supply chain and result in a substantial monetary loss. That is why protecting against cyber threats and securing sensitive data is crucial.

article thumbnail

Stord Expands SOC 2 Type II Compliance, Strengthening Customer Trust and Data Security

Stord

This report successfully validates Stord’s policies and procedures through an independent third-party assessment, demonstrating Stord’s continued commitment to upholding the most rigorous security standards and protecting its customers' data. With SOC 2 compliance, Stord can enable faster and more efficient sales engagements.