- 1. Reducing the risk of supply chain attacks and strengthening security
- (Technology)
- ... able to answer about managing source code and software products (spoiler: the answer to all three should be “yes”). Vetting these answers carefully will help ensure source code will not create a vulnerability ...
- 2. Supply Chain Recovery Will Be Slow at Best
- (Supply)
- ... that source their materials locally are doing well, while those that source from other countries have shown some vulnerability. This disruption is expected to continue up to next year. This, however, depends ...
- 3. Reducing The Risk Of Supply Chain Attacks And Strengthening Security
- (Technology)
- ... able to answer about managing source code and software products (spoiler: the answer to all three should be “yes”). Vetting these answers carefully will help ensure source code will not create a vulnerability ...
- 4. Track These Security Issues that May Affect Your Supply Chain
- (Supply)
- ... element in an organization According to security professionals, humans are the most significant vulnerability in any organization. Their vulnerability comes from intentional or unintentional misuse ...
- 5. These 5 Pandemic-Driven Supply Chain Changes Need Watching
- (Supply)
- ... of automation going forward. Nearshoring While offshoring is a good thing, sourcing items from a far destination was proven by the pandemic to be a big vulnerability that can cause unavailability ...
- 6. KKR Releases “A New Era for Supply Chains”
- (News)
- ... one that sees the traditional supply of goods as being embedded in a ‘mesh’ of interlocking inputs, each with its own risks and value levers. 4. Focus on a supply chain’s critical nodes of vulnerability. Trying ...
- 7. Big Data's Vulnerabilit
- (News)
- Big Data has made huge inroads in most industries, but there are issues out there that shouldn't be overlooked. Storing and retaining the immense volumes of data increases the vulnerability of companies ...
- 8. Watch for the sharks, they may be after your AS/2
- (Management)
- ... to the shark attacks and how serene the waters look as I gazed out across the beach. My contact was describing one particular implementation as well as a vulnerability inherent in a widely used protocol. ...
Most Read
-
-
Feb 13 2013
-
Written by Scott Koegler
-
-
-
Feb 17 2012
-
Written by Scott Koegler
-
-
-
Feb 13 2019
-
Written by Scott Koegler
-
-
-
Jul 18 2017
-
Written by Super User
-