article thumbnail

The Impact of NIS 2 Regulations on Manufacturing Supply Chains 

Logistics Viewpoints

NIS 2 Has Deep Impacts on the Supply Chain, Not Just Plant Operations The manufacturing industry is undergoing a significant transformation as it grapples with the implications of the Network and Information Systems Directive 2 (NIS 2). Its primary aim is to enhance the security of network and information systems across the European Union.

article thumbnail

10 Essential Steps to Enhance Your Supply Chain Cyber Security

Logility

With more and more triple extortion scams on the rise, organizations need to use a layered defense model to get ahead of cyber security risks. In a keynote session at LogiCon24 , one of the speakers, Rachel Wilson, spoke in detail on tactics to supply chain cyber security risk mitigation. They also count on you to be unprepared.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The AI Wars: Battlefronts, Breakthroughs, and the New Era of the Industrial AI (R)Evolution

Logistics Viewpoints

This puts pressure on other device manufacturers to follow suit. Qualcomm announced its latest Edge AI Box solutions , which represent the cutting edge in security and surveillance space. Qualcomm’s Edge AI Box solutions help upgrade existing camera and security assets into smart IoT- and 5G-supported networks.

article thumbnail

10 Ways A Data Gateway Improves Time to Value Across Your End-to-End Supply Chain

Logistics Viewpoints

A manufacturing company, for example, can monitor real-time data from its suppliers, production lines, and distribution centers. Ensures High Security and Reliability A cloud-based approach allows an organization to focus on core business activities by reducing the need for in-house IT management.

article thumbnail

Supply Chain & Logistics News December 2nd- December 5th

Logistics Viewpoints

A Chinese Commerce Ministry directive on dual-use items with both military and civilian applications cited national security concerns. Analysts predict continued momentum for hybrid exports as Chinese automakers aim to address domestic overcapacity and secure a competitive foothold in Europe without triggering further trade restrictions.

article thumbnail

10 Essential Steps to Enhance Your Supply Chain Cybersecurity

Logility

Patch & Update Devices: Software manufacturers are constantly discovering new flaws, bugs, and weaknesses in their code. Companies must rehearse what they would do in the event of a supply chain cyber security attack regularly. They store them for you in a secure cloud and when you need access to them, and autofill for you.

article thumbnail

Unmasking the Supply Chain: How Blockchain Brings Transparency and Trust

Logistics Viewpoints

Supply chains, which facilitate the movement of products from manufacturers to consumers, have historically encountered issues such as inefficiency, fraud, and a lack of transparency. Blockchain technology is supporting this by providing a secure, decentralized, and tamper-proof method for real-time product tracking.