Supply Chain Management

Supply Chain Management (SCM) news, analysis, research, how-to, opinion, and video.

industrial refinery energy plant oil gas
netflix

pulling companies apart chain broken

How secure is your supply chain?

If you're like many organizations, your security focus is on protecting email, financial data and customer data. What if your greatest threats come from your vendors and supply chain?

financial health

Why security leaders need to include financial health when assessing security risk

James Gellert explains the importance of financial health and what to look for when assessing third parties and partners

supply chain

Technology levels the vendor playing field

Gone are the days when the largest vendor in their space was the "right" choice when procuring software. It's time for that viewpoint to change, as the modern age of technology has opened up a world of options for organizations to...

risk complexity tightrope

A better way for security leaders to handle third party risk

Patrick Gorman shares the change in mindset needed to improve how we handle and protect the digital supply chain, third-party risk, and security overall

The Gold Rush

IoT and your digital supply chain

“Money, it's a gas. Grab that cash with both hands and make a stash”, Pink Floyd is always near and dear to my heart. No doubt the theme song to a lot of producers of devices that fall into the category of Internet of Things or...

security group team circuitry

Cyber incident response: Who does what?

“Who in the government will help me if we face a significant cyber incident?”

ljubljana

Hackers, hackers everywhere in Ljubljana

So, that’s a wrap. What a great couple days it has been here in Ljubljana, Slovenia. Not sure where that is? Well, Google Maps can sort that our for you. I remember a few months back that it was announced that a friend of mine...

machine learning

Machine learning: Cybersecurity dream-come-true or pipe dream?

Some security experts believe machine learning is a new Holy Grail for cybersecurity. Others dismiss it as over-hyped. The majority say it falls between those extremes, but is closer to the Holy Grail, and could revolutionize...

security threat ninja hacker hacked

Spending millions on APT defense? Don’t forget about Third Party Risk Management

Being a large company, you have a risk when hiring a third-party consultant - you condemn them to be hacked instead of you.

internet of things smart house

How to secure the Internet of Things and who should be liable for it?

How to secure connected devices before it will be too late?

fbi seal

FBI issues supplier scam warning to businesses

The FBI's Internet Complaint Center (IC3) issued a warning last week about a type of scam that has exposed businesses to a total of $1.2 billion in losses, once the numbers from October 2013 until August 2015 are added up.

false identity

Ubiquiti Networks victim of $39 million social engineering attack

Ubiquiti Networks Inc in its SEC filings reveal they were the victim of a social engineering attack resulting in the loss of $39 million

ICANN website security breached

On foot of a security breach to its website, ICANN has requested that users reset their passwords

rfid cards

Accuvant researchers to release open source RFID access tool

Security researchers have long known about the vulnerabilities of the RFID readers that many buildings use instead of door locks, but facilities managers have been slow to upgrade to more secure systems.

Load More