Supply chain attacks on the rise as one of the biggest new threat vectors as organisations scramble to close gaps

Manufacturing & Logistics IT

the cloud-delivered endpoint protection solutions provider, has announced the results of its global supply chain survey, Securing the Supply Chain, produced by independent research firm Vanson Bourne CrowdStrike Inc.,

LogiSYM Vietnam 2020: Securing Networks & Cyber Security Safeguards

The Logistics & Supply Chain Management Society

A panel session joined by: Serene Keng, Head of Channel, ASEAN+Korea at Proofpoint Inc. Tony Lugg, Founding Member, Supply Chain Innovation Network at KATALYST. Darwin Thio, Managing Partner at SRS Advisory Pte Ltd and SRS Cybernetics Pte Ltd.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

10 must ask supply chain data security questions

Kinaxis

Whenever, wherever or whoever accesses your supply chain information, it’s vital to make sure your data is safe, secure and only accessible by those who should have access. Good data security in your supply starts with proactivity. Are corporate password policies secure enough? Does your staff receive regular security training? Do you routinely evaluate your security policies and procedures?

Securing sensitive manufacturing data

IT Supply Chain

The post Securing sensitive manufacturing data appeared first on IT Supply Chain. By Neil Ballinger (pictured). Head of EMEA, EU Automation. Industry Talk

How artificial intelligence is changing cyber security

IT Supply Chain

The post How artificial intelligence is changing cyber security appeared first on IT Supply Chain. By Neil Ballinger (pictured). Head of EMEA at EU Automation. Industry Talk

Top Data Security Trends/Predictions for 2021

IT Supply Chain

The post Top Data Security Trends/Predictions for 2021 appeared first on IT Supply Chain. By Adam Strange (pictured). HelpSystems’ Data Classification Specialist. Industry Talk

Steps for Beefing Up Your Online Safety & Security

IT Supply Chain

The post Steps for Beefing Up Your Online Safety & Security appeared first on IT Supply Chain. By Brett Chatz (pictured). Market Analyst at LegacyFX. Industry Talk

Important Updates on Cargo Security and Customs Compliance

Talking Logistics

In this episode, Kevin Gavin , VP of Supply Chain Compliance at Descartes, provides an update on several important cargo security and customs compliance initiatives, such as the Importer Security Filing (ISF) and Air Cargo Advance Screening (ACAS) program, along with some recommendations for shippers, freight forwarders, and 3PLs on how to create best-in-class cargo security and customs compliance processes.

How AI Can Counter Cyber Security Threats

IT Supply Chain

The post How AI Can Counter Cyber Security Threats appeared first on IT Supply Chain. By Samantha Kaylee (pictured). Assistant Editor at Crowd Writer. Industry Talk

Third-Party Access and Cyber Security Vulnerabilities

IT Supply Chain

The post Third-Party Access and Cyber Security Vulnerabilities appeared first on IT Supply Chain. By David Higgins (pictured). EMEA Technical Director at CyberArk. Industry Talk

7 Supply Chain Security Concerns to Address in 2019

The Network Effect

The post 7 Supply Chain Security Concerns to Address in 2019 appeared first on The Network Effect. “All across Maersk headquarters, the full scale of the crisis was starting to become clear. Within half an hour, Maersk. Cloud Risk Technology cybersecurity risk management supply chain

Covid-19 vaccine hack – Is security in healthcare a lost cause?

IT Supply Chain

Co-Founder & CTO, Secure Code Warrior. The post Covid-19 vaccine hack – Is security in healthcare a lost cause? By Matias Madou (pictured). appeared first on IT Supply Chain. Industry Talk

Mobile Device Management – Boost Productivity, Increase Security & Reduce Complexity

IT Supply Chain

The post Mobile Device Management – Boost Productivity, Increase Security & Reduce Complexity appeared first on IT Supply Chain. By Jeff Gilbert (pictured). Systems Engineer, JLT Mobile Computers.

Securing Information Throughout the Supply Chain – Preventing Supplier Vulnerabilities

IT Supply Chain

The post Securing Information Throughout the Supply Chain – Preventing Supplier Vulnerabilities appeared first on IT Supply Chain. By Adam Strange (pictured). Data Classification Specialist, HelpSystems.

FDA Making Drug Supply Chain More Secure

Material Handling and Logistics

"Using new innovations, we believe we can improve the overall security of our closed system and improve our ability to prevent the introduction of illegitimate products," says FDA commissioner Scott Gottlieb

How Do You Secure Your High-Value Shipments?

Tive

Cargo loss can trigger a domino effect of costs — lost revenue, supply chain interruptions, insurance claims, replacement shipments, customer service costs, and more. For high-value loads, the stakes are even higher.

Blockchain Revolution: Can It Solve Security Problems?

Descartes

There has been a great discussion about the potential of the blockchain as a distributed ledger and as a secure solution for small and large business transactions. The post Blockchain Revolution: Can It Solve Security Problems? Some visionaries see the technology as revolutionary as the Internet itself, but others are restrained by its legal and compliance frameworks. The blockchain has a potential to become an important tool in building.

Editor’s Pick: Seven Guidelines for API Security in a Digitized Supply Chain Network

Talking Logistics

This post from Elemica’s blog provides guidelines on how to manage the security of the data and the management of APIs. Read more Editor’s Pick: Seven Guidelines for API Security in a Digitized Supply Chain Network.

Benefits of Using Artificial Intelligence in Cyber Security

IT Supply Chain

The post Benefits of Using Artificial Intelligence in Cyber Security appeared first on IT Supply Chain. By Aaron Swain (pictured). Professional Writer & Blogger. Industry Talk

Trends 2016: Cyber Security

Enterra Insights

Cyber security is a concern that will continue to plague governments, businesses, and individuals in the years ahead. The post Trends 2016: Cyber Security appeared first on Enterra Solutions. As our … Continued. Artificial Intelligence Big Data Business Connectivity Current Affairs digital enterprise Risk Management Supply Chain Technology Web/Internet Enterra Solutions Internet Stephen DeAngelis

Small Manufacturers Play Critical Role in Securing the Supply Chain

Material Handling and Logistics

A recent survey that explored the cybersecurity challenges faced by the global manufacturing industry showed that manufacturers still face security concerns, including those related to the Internet of Things (IoT)-integrated devices and employee error, and that they continue to struggle with finding skilled cybersecurity staff and may be underspending on security training.

Questions To Ask SaaS Providers Regarding Security

Abivin

But there are a few things that organizations should be acknowledged before fully adopt SaaS softwares, as it also introduces new challenges related to security, such as: data breaches, data loss, denial-of-service attacks, downtime. To overcome these challenges and adapt to become SaaS-powered enterprises, organizations need to consider what are the key questions regarding security to consider before choosing a SaaS vendor.

Food Security and Science

Enterra Insights

The post Food Security and Science appeared first on Enterra Solutions. Earlier this year, the Pew Research Center released results from two polls that indicate a majority of scientists have confidence … Continued. Agriculture Food and Drink Globalization Risk Management Supply Chain Technology

Questions To Ask SaaS Providers Regarding Security

Abivin

But there are a few things that organizations should be acknowledged before fully adopt SaaS softwares, as it also introduces new challenges related to security, such as: data breaches, data loss, denial-of-service attacks, downtime. To overcome these challenges and adapt to become SaaS-powered enterprises, organizations need to consider what are the key questions regarding security to consider before choosing a SaaS vendor.

4 Air Freight Packaging Pointers from Securing Drums to Pallets

Cerasis

Particularly important to the client is the safe, secure shipping of their product, and in no case is this truer than when it is carried by aircraft. The process for preparing drum units for air transportation can either be a recipe for a safe, secure flight or for disaster just waiting to happen. Twitter Facebook Google+ LinkedIn The post 4 Air Freight Packaging Pointers from Securing Drums to Pallets appeared first on Freight Logistics Company | Cerasis.

Organisations will stop striving for ‘complete security’ to focus on cyber resilience in 2021

IT Supply Chain

The post Organisations will stop striving for ‘complete security’ to focus on cyber resilience in 2021 appeared first on IT Supply Chain. By Jon Fielding (pictured). Apricorn's Managing Director EMEA.

Perfect Security by 2025?

Inbound Logistics

New technology enables new advances in supply chain security. What will security look like in 2025

Ready for Full Enforcement of Importer Security Filing?

Talking Logistics

Customs and Border Protection (CBP) will begin the liquidated damages phase of Importer Security Filing (ISF) enforcement. Liquidated damages in simplified terms refer to a penalty secured by a bond. Last week on Talking Logistics , I interviewed Kevin Gavin, VP of Supply Chain Compliance at Descartes Systems Group (a Talking Logistics sponsor) about various cargo security and trade compliance programs, including ISF. Starting on July 9, 2013, U.S.

Securing the First, Middle and Last Mile with Andrew Kelley

The Logistics of Logistics

Securing the First, Middle and Last Mile with Andrew Kelley. Andrew Kelley and Joe Lynch discuss securing the first, middle and last mile. As supply chains evolve, the need for secure asset transfer increases for both consumers and business to business applications. BoxLock is the industry leader in secure, unattended delivery technology. The post Securing the First, Middle and Last Mile with Andrew Kelley appeared first on The Logistics of Logistics.

UK businesses should proactively secure their software ahead of the second lockdown

IT Supply Chain

The post UK businesses should proactively secure their software ahead of the second lockdown appeared first on IT Supply Chain. By Paul Farrington (pictured). Industry Expert & EMEA CTO at Veracode.

Cyber Security and the Digital Supply Chain!

Supply Chain Game Changer

When it comes to the modern supply chain managers have a relatively new risk to consider: Cyber Security! As major logistics providers from all around the world struggle with keeping their private data secure, businesses are investing time and resources to address this serious concern. From shutting down major ports to the risk of losing private client data, the time is now to address Cyber Security in the supply chain. The post Cyber Security and the Digital Supply Chain!

Tive Secures $12 Million Series A Capital Funding

Tive

Today, we announced our Series A funding round of $12 million backed by Raju at RRE Ventures and Villi at Two Sigma Ventures , with further investment from our current investors NextView Ventures , Hyperplane Ventures , One Way Ventures , Fathom Ventures , Sage Hill Capital , and many other leaders in the supply chain tech industry.

Supply Chain Cyber Security Risks Rising

Enterra Insights

Concerns about cyber security are nothing new. Elena Kvochko (@elenakvochko), a cyber security expert, observes, “Cyber security has long become … Continued. The post Supply Chain Cyber Security Risks Rising appeared first on Enterra Solutions. Business Digital Supply Chain Risk Management Supply Chain digital enterprise digital supply chain Enterra Solutions Stephen DeAngelis Technology

Insecure About SaaS Security?

C3 Solutions

And as they gain in acceptance they also have to overcome the biases of those who believe that computing in the cloud can compromise security. Cloud-based or Software-as-a-Service (SaaS) applications are quickly gaining in popularity across a wide spectrum of businesses. SaaS supply chain systems cloud-based supply chain systems

Paying it Forward: COVID-19 has increased the need for security, ease and speed in making payments

BluJay Solutions

The post Paying it Forward: COVID-19 has increased the need for security, ease and speed in making payments appeared first on BluJay Solutions Ltd.