Supply Chain Management (SCM)

Supply Chain Management (SCM) news, analysis, research, how-to, opinion, and video.

supply chain
risk complexity tightrope

The Gold Rush

IoT and your digital supply chain

“Money, it's a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the category of Internet of Things or...

dhs security

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”


Hackers, hackers everywhere in Ljubljana

So, that’s a wrap. What a great couple days it has been here in Ljubljana, Slovenia. Not sure where that is? Well, Google Maps can sort that our for you. I remember a few months back that it was announced that a friend of mine...

machine learning

Machine learning: Cybersecurity dream-come-true or pipe dream?

Some security experts believe machine learning is a new Holy Grail for cybersecurity. Others dismiss it as over-hyped. The majority say it falls between those extremes, but is closer to the Holy Grail, and could revolutionize...

security threat ninja hacker hacked

Spending millions on APT defense? Don’t forget about Third Party Risk Management

Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

internet of things smart house

How to secure the Internet of Things and who should be liable for it?

How to secure connected devices before it will be too late?

fbi seal

FBI issues supplier scam warning to businesses

The FBI's Internet Complaint Center (IC3) issued a warning last week about a type of scam that has exposed businesses to a total of $1.2 billion in losses, once the numbers from October 2013 until August 2015 are added up.

false identity

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc in its SEC filings reveal they were the victim of a social engineering attack resulting in the loss of $39 million

ICANN website security breached

On foot of a security breach to its website, ICANN has requested that users reset their passwords

rfid cards

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.

government congress house of representatives cloud

Agencies need to pay more attention to supply chain security

Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result.

Indianapolis 148492252

CircleCityCon: Protecting the supply chain

On Saturday, during an early morning session at CircleCityCon in Indianapolis, Akamai's Dave Lewis addressed the topic of supply chain security with the conference's early risers.

outsource in house ts

Top five reasons companies are avoiding managed services

For many small and midsize companies, having someone else remotely monitor and manage their computer network is a no-brainer. But according to a new study from CompTIA, companies that don't use managed service providers are more...

cloud tools

US proposes tighter export rules for computer security tools

The U.S. Commerce Department has proposed tighter export rules for computer security tools, a potentially controversial revision to an international agreement aimed at controlling weapons technology.

tesla supercharger station tesla model s resized

Tesla attack started with a single phone call

Last weekend, Tesla Motors had their website, and Twitter accounts hijacked by individuals looking to play a joke. They used their access to deface the company's website and spam a computer repair shop in Illinois, posting their...

zombie dude

Zombie apps haunt BYOD workplaces

According to a new study of around 3 million apps on employee smartphones, 5.2 percent of iOS apps and 3.9 percent of Android apps are actually dead, removed from their respective app stores and no longer supported.

rsa moscone south

166816 (Z66816): A post-RSA Conference recap

Default credentials: Ignored by those who should be paying attention, and collected by everyone else, they're the reason most breaches don't need to be too technical.

dell e2414hr 24 inch monitor 500x700

Dell support tool put PCs at risk of malware infection

Attackers could have remotely installed malware on systems running a flawed Dell support tool used to detect customers' products. A security researcher discovered the flaw in November and reported it to the PC manufacturer, which...

Load More