Total: 10 results found.

Search for:
Search Only:

1. Expanded Payment Options Can Help Merchants Boost Customer Loyalty and Satisfaction
(News)
... payments made with bitcoin are final—there is no risk of chargebacks—and transaction fees can be reduced or even eliminated. At the same time, there are security concerns given that hackers have scored ...
Created on 16 April 2018
2. Who Cares About Cyber Attacks on Supply Chains?
(Management)
... it’s a supply chain and not something hackers can easily monetize. But the games and the stakes have changed.   Multiple malware researchers including Symantec report that attacks on supply chain ...
Created on 26 March 2018
3. Blockchain Obstacles and Opportunities
(Technology)
... data transfer, including the use of digital fingerprints as a universal form of personal ID. Though it’s much more difficult for hackers to break into a blockchain than a centralized system, they can ...
Created on 01 January 2018
4. IoT Home Security Concerns
(News)
The more we learn about the Internet of Things, the more we can envision the benefits and potential issues. Security has been a big concern all along, but it's getting a little more real now as products ...
Created on 20 April 2015
5. Should EDI be outsourced?
(EDI)
Today’s CIO has more on their mind than merely keeping their company’s data safe from hackers, which isn’t easy in light of the lightning speed technology is advancing. Matters such as BYOD, shadow IT, ...
Created on 15 April 2015
6. No Risk EDI
(EDI)
...  Fourth step: Decide what protections to enable Security measures are changing all the time in response to the ever present intrusions and disruptions caused by hackers and other bad actors. Once you’ve ...
Created on 13 April 2015
7. Hacker Risks
(News)
Adrian Gonzalez, on his Talking Logistics site, describes some scary scenarios involving hackers in the supply chain. There are all kinds of risks to be aware of and to avoid, and this is one that may ...
Created on 23 July 2014
8. It's Risky Out There
(Supply)
... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
Created on 18 August 2012
9. It's Risky Out There
(Logistics)
... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
Created on 18 August 2012
10. How to Succeed: Ecommerce in 2012
(Retail)
... functions. Automation, in particular, is critical as companies try to keep up with the speed of ecommerce, notes Charlie Hackerson, VP of supply chain enablement at SPS Commerce, a provider of on-demand ...
Created on 03 March 2012