article thumbnail

Self-Checkout Turns Customers into Employees and Employees into Security Guards

Enterra Insights

Journalist Chris Gorrie reports, “Walmart’s heavy reliance on self-checkout has necessitated the deployment of workers as makeshift security personnel, actively monitoring customers for potential theft.”[2] ”[4] Journalist Sam Becker reports that many stores are reconsidering their self-checkout strategy.

Security 246
article thumbnail

Security Teams Communication Strategies for Protecting Executives during Business Travel

IT Supply Chain

By Rob Jackson (pictured) Content Writer The post Security Teams Communication Strategies for Protecting Executives during Business Travel appeared first on IT Supply Chain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Addressing Global Food Security

Enterra Insights

2] With more mouths to feed each and every day, global food security remains a serious challenge. The most important commodities for global food security are grains — wheat, maize, and rice account for over half of all human caloric consumption. Levy adds, “Right now, 325 million people are acutely hungry.

Food 130
article thumbnail

Cloud ERP Security Concerns: Best Practices for a Secure Future

RFgen

But this shift also brings up pressing concerns around data security. Are cloud-based security measures and protocols robust enough—and reliable enough—to safeguard sensitive data? For example, certain government contract companies in aerospace and defense stick to on-premise ERP systems for national security reasons.

article thumbnail

How to Package and Price Embedded Analytics

Just by embedding analytics, application owners can charge 24% more for their product. How much value could you add? This framework explains how application enhancements can extend your product offerings. Brought to you by Logi Analytics.

article thumbnail

It’s crucial that organisations implement a robust, layered security strategy

IT Supply Chain

The post It’s crucial that organisations implement a robust, layered security strategy appeared first on IT Supply Chain. Sigurðsson (pictured). Senior Manager of Detection Technologies, Cyren.

article thumbnail

Strategies to secure stakeholder buy-in for corporate training

Procurement Academy

There are, though, several strategies that can help to secure this support from the key figures across your business. To secure their buy-in, you will need to be able to establish an engaging vision for the training program you want to introduce, and effectively communicate its benefits to the members of your team.