Total: 48 results found.

Search for:
Search Only:

Page 1 of 3

1. 6 Steps to Data-Driven Transformation
... data governance, security, and privacy by this time. By my standards, however, many of the companies I work with are still quite far behind the curve. While the importance of safeguards should go without ...
Created on 19 November 2018
2. Selling Cloud Based Supply Chain Services To Non-Technical Clients
... u read that correctly. We don’t mean the client’s systems, but rather the client, themselves. You already perform system, platform, infrastructure, and cybersecurity audits, why not an examination on yo ...
Created on 12 November 2018
3. Real-Time Collaborative Logistics Platform
... payments can be scheduled automatically, eliminating emails and faxes so everyone gets paid faster. Security and Privacy: Turvo is secure by design and built on an enterprise-grade cloud platform.  Gra ...
Created on 12 November 2018
4. Homeland Security Steps into Supply Chain
According to FCW, the Department of Homeland Security is taking threats to the US supply chain seriously. They have launched a task force to assess cyber threats against the supply chain.   Read ...
Created on 05 November 2018
5. IBM on Two Fronts
... a skeptic of using blockchain technologies in the supply chain.  The technology’s most important advantage for cyber currencies have been born out as security, transparency, and immutability. Blockchain ...
Created on 29 October 2018
6. Logistics Systems Incorporated (LSI) Awarded Multiple Award IT Contract by the Army
...  under this indefinite delivery/indefinite quantity (IDIQ) contract include nearly all areas of enterprise IT including cybersecurity, integration, consolidation, telecommunications, operation and maintenance ...
Created on 15 October 2018
7. Department of Homeland Security Looks for Information
According to FedScoop, the Department of Homeland security is looking to conduct market research on how to assess risk in the supply chain.   Read the article onFedScoop  ...
Created on 10 September 2018
8. Yes, There is a Trend
... more general use as a secure way to store transactions for business. Certainly the security of order and transport information is important and if companies are able to address latency and processing cost ...
Created on 28 August 2018
9. When will blockchain overrun the supply chain?
Everything is blockchain. The technology is the answer to every problem even vaguely connected to data and security. At least that’s what the current buzz surrounding today’s darling technology. But is ...
Created on 31 July 2018
10. Keeping the Government Supply Chain Secure
According to, the Department of Homeland Security wants to additional personnel to help keep the government supply chain secure.   Read the articleon  ...
Created on 16 July 2018
11. eCommerce Sales Grew 16% in 2017; Online Fraud Soared 30%
... of customers’ identity.(3) Merchants are also getting mixed messages from consumers: 66% of shoppers favor security protocols for online transactions because it makes them feel protected, yet 35% say they ...
Created on 07 May 2018
12. Be a Supply Chain Hero by Jumping Ahead of the Pack
... by and large untested for security, and that’s because a full security standard for IoT has not been ratified and accepted, much less implemented. SC managers need to be wary of any communicating device ...
Created on 16 April 2018
13. Expanded Payment Options Can Help Merchants Boost Customer Loyalty and Satisfaction
... payments made with bitcoin are final—there is no risk of chargebacks—and transaction fees can be reduced or even eliminated. At the same time, there are security concerns given that hackers have scored ...
Created on 16 April 2018
14. Who Cares About Cyber Attacks on Supply Chains?
The answer is that you should be caring about the security of your supply chain more now than you ever have. In fact supply chains have had a relative free period for many years because… well, because ...
Created on 26 March 2018
15. Technologies are defining the supply chain
... IoT at its heart provides connectivity between its multiple installations and enterprise networks and there exists no standardized and ratified security standard to protect IoT devices from hacking. The ...
Created on 29 January 2018
16. Blockchain Obstacles and Opportunities
... welcomes the opportunity to discuss fraud prevention, FinTech and security best practices at upcoming industry conferences and events, where she frequently participates as a featured speaker. She is also ...
Created on 01 January 2018
17. 2018 Supply Chain Tech Predictions
... already have been vetted for security purposes   Read the article on eWeek  ...
Created on 19 December 2017
18. Keeping the Supply Chain Secure
According to Security Planet, supply chain security is important, not only at a company level, but on a global level. The only way to ensure that the supply chain is secure is to follow proper processes ...
Created on 24 October 2017
19. Full-Circle Fraud: How the Equifax Breach Will Lead to Merchant Losses
Since the news first broke several weeks ago, we’ve learned that the Equifax breach is one of the biggest consumer security incidents in history - potentially affecting roughly 143 million Americans. With ...
Created on 10 October 2017
20. Is the Future of EDI in Blockchain?
... over and totally change the way B2B transactions take place. To be sure, the security and distributed nature of blockchain based data transfer offer advantages to almost every participant along the path ...
Created on 06 September 2017