- 1. How to Utilize Digital Twins in Supply Chain Management
- (Supply)
- Digital twins have emerged as an effective strategy for overcoming disruptions and building resilience in supply chains. They can deliver data-driven insights and integrated planning capabilities that ...
- 2. The Dark Side of RFID: Employee Surveillance and Privacy Invasion
- (Technology)
- ... Accordingly, hospital staff can be monitored at any given moment during working hours. The data or information collected from them is sensitive and can be vulnerable to cyberattacks. This surveillance ...
- 3. Cloud Computing Solutions for Supply Chain Efficiency
- (Technology)
- ... cloud computing shines. Cloud service providers invest heavily in robust security measures, ensuring that data stored in the cloud is protected from cyber threats. This level of security is often challenging ...
- 4. Cyberattacks Could Put Our Food Supply at Risk
- (News)
- Modern Farmer Farm. Food. Life. is reporting that cyberattacks could put our food supply at risk. With the rise of digital technology, the food industry is increasingly vulnerable to malicious cyberattacks. ...
- 5. The Importance of Supply Chain Resilience
- (Supply)
- ... disruptions, such as natural disasters, cyberattacks, or operational failures. It involves identifying potential risks, implementing strategies to minimize their impact, and quickly adapting to changes ...
- 6. Impact of Autonomous Vehicles on Supply Chain Management in 2023
- (Logistics)
- ... Although AVs have various benefits in supply chain management, there are also new challenges and considerations that businesses must address. The leading challenge to AVs and the supply chain is cybersecurity. ...
- 7. The Nation’s Supply Chains Need An Upgrade
- (Technology)
- ... of potential breakdowns as they occur. Even without the pandemic’s sea change impacts on society, other undercurrents existed to challenge how our supply chains function, not the least in cybersecurity ...
- 8. Build More Resilience into Your Supply Chain
- (Supply)
- ... interventions in dealing with disasters, including natural disasters and man-made disasters such as cyber-attacks and exploitations, by exploiting supply chain vulnerabilities. Following the Covid-19 pandemic, ...
- 9. Government Supply Chains at Risk
- (News)
- A government watchdog organization reports that the Defense Department should keep better track of supply chain risks, reports FCW. The Defense Department should keep better track of its cybersecurity ...
- 10. NIST Issues Guidance to Keep Supply Chain Safe
- (News)
- The supply chain is vulnerable but there are ways to keep it safe, reports NIST. A vulnerable spot in global commerce is the supply chain: It enables technology developers and vendors to create and deliver ...
- 11. Monitor Your Supply Chain to Identify Opportunities
- (Supply)
- ... products reach where they are needed. Cyberattacks Cyberattacks have become a menace to many industries, and supply chains have been identified as the most dangerous areas where hackers and malicious ...
- 12. Reducing the risk of supply chain attacks and strengthening security
- (Technology)
- ... moving in 2022 will take on a whole new level of complexity -- especially when it comes to keeping them secure from cyberattacks. The SolarWinds and Colonial Pipeline security breaches are two (of ...
- 13. Reducing The Risk Of Supply Chain Attacks And Strengthening Security
- (Technology)
- ... moving in 2022 will take on a whole new level of complexity -- especially when it comes to keeping them secure from cyberattacks. The SolarWinds and Colonial Pipeline security breaches are two (of ...
- 14. Supply Chain is Target of Cyber Attacks
- (News)
- The supply chain is becoming a more frequent target for cyber criminals, reports Computer World. A year ago, the SolarWinds attack brought software supply-chain attacks to the forefront of the news. ...
- 15. Russian Sanctions Hit Supply Chain
- (News)
- Sanctions against Russia could further disrupt the already muddled supply chain, reports CIO Dive. The Ukraine invasion threatens spillover cyber risk, with critical industries on high alert. However, ...
- 16. The Sequence to Success in Supply Chain Management
- (Supply)
- ... of the supply chain to businesses, a simple breakdown of communication at any point can be a disaster. Ensure security Supply chains have over the recent years been a target of cybercriminals, ...
- 17. These Technologies Make a Difference in Operating Your Supply Chain
- (Technology)
- ... the future. While IoT has many advantages, it opens up a new door concerning increased cybersecurity challenges. With the increased adoption of IoT in manufacturing and logistics, the risk of attacks ...
- 18. Securing the Supply Chain
- (News)
- The supply chain is the weakest security link, reports Next Gov. The recent cyberattacks against SolarWinds and other widely used technology providers demonstrates the lengths to which foreign nation-states ...
- 19. Can You Work Around Supply Chain Problems?
- (Logistics)
- ... industry, the retailers are trying to navigate an increasing number of factory shutdowns, transit times and rising costs, which are some of the biggest challenges currently. Solve cyber attacks Cyber ...
- 20. Getting Security Authenticated By Third Party
- (News)
- According to NextGov, the Commerce secretary suggests third parties should sign off on software applications to keep the supply chain safe. The Commerce secretary should consider whether connected software ...
Most Read
-
-
Feb 13 2013
-
Written by Scott Koegler
-
-
-
Feb 17 2012
-
Written by Scott Koegler
-
-
-
Feb 13 2019
-
Written by Scott Koegler
-
-
-
Jul 18 2017
-
Written by Super User
-