- 1. The Complexity of the Supply Chain
- (Logistics)
- ... an easy target for hackers. The forces that lead to supply chain success are not always straightforward. The main driver is speed of delivery (which can be measured in minutes). But it also has to do ...
- 2. Farm Equipment is Vulnerable to Attack
- (News)
- According to BBC, “smart” farm equipment is open to attack from malicious hackers. Modern "smart" farm machinery is vulnerable to malicious hackers, leaving global supply chains exposed to risk, experts ...
- 3. Supply Chain Delays are Inevitable
- (Supply)
- ... an easy target for hackers. The forces that lead to supply chain success are not always straightforward. The main driver is speed of delivery (which can be measured in minutes). But it also has to do ...
- 4. Monitor Your Supply Chain to Identify Opportunities
- (Supply)
- ... products reach where they are needed. Cyberattacks Cyberattacks have become a menace to many industries, and supply chains have been identified as the most dangerous areas where hackers and malicious ...
- 5. Securing the Supply Chain
- (News)
- The supply chain is the weakest security link, reports Next Gov. The recent cyberattacks against SolarWinds and other widely used technology providers demonstrates the lengths to which foreign nation-states ...
- 6. Can You Work Around Supply Chain Problems?
- (Logistics)
- ... dangerous attacks on you and others. If there is any lax, hackers may capitalize on it to access the systems and steal valuable data or assets. The chance of your supply chain being disrupted by cyberattacks ...
- 7. Supply Chains Vulnerable to Cyber Attacks
- (News)
- According to Fox Business, the supply chain is a target for a majority of cyber attacks. Over 95% of the companies surveyed admitted to a cybersecurity breach of their supply chain. A new study says ...
- 8. Ransomware Attacks put Food Industry's Supply Chain at Ris
- (Logistics)
- ... may be the ideal targets for hackers as they often have outdated software and laxed cybersecurity. According to John Hoffman, a senior research fellow at the Food Protection and Defense Institute at ...
- 9. Supply Chain Attacks Used Images
- (News)
- According to Texas News Today, hackers use malicious images to target attacks on the supply chain. Cybercriminals are beginning to use malicious container images as a way to install crypto miners on ...
- 10. Here's How Your Logistics Are Changin
- (Logistics)
- ... platforms. With working from home now a new normal, hackers work overtime to cause problems to shippers, clients, and logistics firms, most of who cannot fight back. Generally, as we enter a new age ...
- 11. Track These Security Issues that May Affect Your Supply Chain
- (Supply)
- ... its reputation. Employees are also a target of hackers through social engineering. The hackers exploit human’s known weaknesses such as trust and curiosity to get into the systems and steal information ...
- 12. Hack Highlights Supply Chain Flaws
- (News)
- According to NextGov, the recently discovered government hack shows that there needs to be greater supply chain security. Hackers’ resounding success penetrating a third party to access targeted government ...
- 13. The Supply Chain is Changing - Are You Ready?
- (Supply)
- ... and information from manipulation or editing. This technology is protecting data from hackers and malicious individuals who might want to carry out espionage activities. Blockchain allows only those permitted ...
- 14. Hackers Threaten Supply Chain
- (News)
- Hackers are threatening to disrupt the vaccine supply chain, reports the Hill. Government officials and health-care groups are growing increasingly concerned about nation states and criminal hackers ...
- 15. Which of These Technologies Are You Ignoring?
- (Technology)
- ... hackers and malicious individuals by requiring only people in the blockchain network to participate in a particular transaction. In the supply chain, blockchain allows companies to secure everything ranging ...
- 16. Tiny Tags Make the Supply Chain Safer and More Trackable
- (Supply)
- ... with low energy consumption. Called “tag of everything,” the chip can be used to track the logistics of every product at a low cost to ensure it is what it claims without hackers noticing. According ...
- 17. Team Bloodchain Wins GS1 US Trace-a-thon for Its Innovative Traceability Solution
- (News)
- ... won the second-place $4,000 prize and Supplypedia took the third-place $2,000 prize. More than 80 hackers on 18 teams competed in the event designed to create supply chain traceability solutions. The ...
- 18. Here's What The US Congress Is Working On To Protect The Supply Chai
- (Management)
- ... by hackers, state and non-state actors. Due to the advancement of technology, a slight mistake can be exploited by adversaries who might take advantage of it to cripple the country’s critical systems. ...
- 19. Supply Chain Hacking is Gaining Momentum
- (Technology)
- ... code within the hardware, software, and apps in the supply chain, hackers have the capability of infecting thousands or even millions of computers within a very short time without the slightest evidence ...
- 20. Is Your Supply Chain Safe from Cyber Threats
- (News)
- Every link in your supply chain is a chance for a hacker to exploit a weakness in your supplier’s cyber security to get to you, reports Forbes. Read the article on Forbes
Most Read
-
-
Feb 13 2013
-
Written by Scott Koegler
-
-
-
Feb 17 2012
-
Written by Scott Koegler
-
-
-
Feb 13 2019
-
Written by Scott Koegler
-
-
-
Jul 18 2017
-
Written by Super User
-