- 21. Hackers Hit Supply Chains
- (News)
- According to ARS Technica, a group of hackers has been targeting supply chains. So far, 6 companies have been compromised. Read the article on ARS Technica
- 22. Image-I-Nation Technologies Just got Breached- Why you Should Care
- (Technology)
- Between November 1 and 15, 2018, a hacker or hackers had entry into Image-I-Nation Technologies’ database full of customer’s personal information. Some of the data breached included customers’ names, home ...
- 23. Expanded Payment Options Can Help Merchants Boost Customer Loyalty and Satisfaction
- (News)
- ... payments made with bitcoin are final—there is no risk of chargebacks—and transaction fees can be reduced or even eliminated. At the same time, there are security concerns given that hackers have scored ...
- 24. Who Cares About Cyber Attacks on Supply Chains?
- (Management)
- ... it’s a supply chain and not something hackers can easily monetize. But the games and the stakes have changed. Multiple malware researchers including Symantec report that attacks on supply chain ...
- 25. IoT Home Security Concerns
- (News)
- The more we learn about the Internet of Things, the more we can envision the benefits and potential issues. Security has been a big concern all along, but it's getting a little more real now as products ...
- 26. Should EDI be outsourced?
- (EDI)
- Today’s CIO has more on their mind than merely keeping their company’s data safe from hackers, which isn’t easy in light of the lightning speed technology is advancing. Matters such as BYOD, shadow IT, ...
- 27. No Risk EDI
- (EDI)
- ... Fourth step: Decide what protections to enable Security measures are changing all the time in response to the ever present intrusions and disruptions caused by hackers and other bad actors. Once you’ve ...
- 28. Security Challenges for the Industrial IoT
- (News)
- We're all anxiously awaiting the arrival of the benefits promised by the industrial Internet of Things (IoT). There are still challenges in the way, an important one being security.Steve Banker, on the ...
- 29. Hacker Risks
- (News)
- Adrian Gonzalez, on his Talking Logistics site, describes some scary scenarios involving hackers in the supply chain. There are all kinds of risks to be aware of and to avoid, and this is one that may ...
- 30. Leave Your Comfort Zone
- (News)
- Everyone has their own 'comfort zone'. Breaking out of it can be painful, but may also yield breakthroughs.Alan Henry on the Lifehacker site explains the science, the issues, and the benefits. Check it ...
- 31. It's Risky Out Ther
- (Supply)
- ... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
- 32. It's Risky Out Ther
- (Logistics)
- ... for transactions and commerce (i.e. data theft, denial of service attacks, hackers, network reliability, cloud security), but they also implement safeguards into the applications used by the business to ...
- 33. How to Succeed: Ecommerce in 2012
- (Retail)
- ... functions. Automation, in particular, is critical as companies try to keep up with the speed of ecommerce, notes Charlie Hackerson, VP of supply chain enablement at SPS Commerce, a provider of on-demand ...
- 34. Watch for the sharks, they may be after your AS/2
- (Management)
- ... to do with AS/2 since once at the console, the hacker would have free access to the entire system. Nevertheless, just because these folks can't imagine it, that doesn't mean it can't happen. So for now ...
Most Read
-
-
Feb 13 2013
-
Written by Scott Koegler
-
-
-
Feb 17 2012
-
Written by Scott Koegler
-
-
-
Feb 13 2019
-
Written by Scott Koegler
-
-
-
Jul 18 2017
-
Written by Super User
-