- 21. Are These Challenges Facing You This Year?
- (Management)
- ... until the coronavirus pandemic spread across the world. Moving forward, it will be crucial that organizations critically assess their supply chains and identify their vulnerabilities and weaknesses. Companies ...
- 22. Covid Exposes Supply Chain Flaws
- (News)
- Thanks to Covid retailers have learned some valuable lessons about vulnerabilities in the supply chain, reports Retail Information Systems. Blind spots were exposed in the retail supply chain during ...
- 23. Supply Chain Deficiencies are highlighted by COVID-19
- (Supply)
- The COVID-19 pandemic has clearly exposed the vulnerabilities and weaknesses in global supply chains. It has demonstrated the dangers of relying on a single supply chain route and manufacturing facilities ...
- 24. Tiny Tags Make the Supply Chain Safer and More Trackable
- (Supply)
- ... both private and public keys to ensure communications are private. The work of developing this technology started as a way of enhancing RFID tags that had shown vulnerabilities. They were aiming at ...
- 25. Supply Chain Industry on Edge as Coronavirus Continues to Spread
- (Supply)
- ... Woodcock – 72% of all active pharmacy ingredients are made in China. In a statement to Congress, she indicated that the shear number of APIs being made overseas could “creates vulnerabilities in the U.S. ...
- 26. US Feds Want Supply Chain Infrastructure Security
- (Technology)
- ... issues that are faced currently. These issues include counterfeit parts, economic risks and cyber vulnerabilities. By cataloging these threats, federal leaders can use the information to evaluate the security ...
- 27. Image-I-Nation Technologies Just got Breached- Why you Should Care
- (Technology)
- ... to spot vulnerabilities.” If you think your data was breached by Image-I-Nation Technologies review the “Information About Identity Theft Prevention” reference guide which identifies additional precautions ...
- 28. Did You Forget Your Cloud Security Must Be GDPR Compliant Too?
- (Management)
- ... security vulnerabilities might have gotten missed. Could your neck be on the chopping block if, during an inspection it got discovered, your company’s cloud security is weak and not GDPR compliant? BREACH ...
- 29. IoT Devices and the Recent Internet Slowdown
- (News)
- Numerous articles have been written about the potential security vulnerabilities of Internet of Things (IoT) devices. Hot off the press is an example of how these issues can be exploited.In a short article ...
- 30. HP Becomes The First IT Company To Establish Rules Against Exploiting Foreign Laborers
- (Management)
- ... incarnation of HP’s Supplier Code of Conduct also addresses the vulnerabilities of foreign migrant workers as they populate supply chain jobs. Further, the new Code establishes the minimum requirements ...
- 31. Build Resilience into Your Supply Chain
- (News)
- Arthur van Gerven on the Logistics Viewpoints blog site tells us that supply chains need to be resilient in our risky world. All the planning in the world can't predict what's coming our way, but we can ...
- 32. Data Security Concerns
- (News)
- Corporate data security is a major challenge for everyone. Two experts on the subject, Joel Brenner and Dana Gardner, talk about aspects of cyber crime and international data espionage efforts on the supply ...
- 33. Controlling Currency Risk
- (Management)
- ... to explain, this isn't realistic in the US at the moment; most companies are left to their own devices in hedging exchange vulnerabilities. An earlier installment of "The Payof" mentioned the TransferWise ...
Most Read
-
-
Feb 13 2013
-
Written by Scott Koegler
-
-
-
Feb 17 2012
-
Written by Scott Koegler
-
-
-
Feb 13 2019
-
Written by Scott Koegler
-
-
-
Jul 18 2017
-
Written by Super User
-