When former U.S. Customs and Border Protection Commissioner Robert Bonner was asked how technology could help improve supply chain security, he answered in two words: smart containers Supply Chain SecurityWhen former U.S. Customs and Border Protection Commissioner Robert Bonner was asked how technology could help improve supply chain security, he answered in two words: smart containers.Smart containers could tell Customs officials whether a container had been opened and, if so, when and where. Unfortunately, smart containers still have problems, including high costs, security concerns and a high number of false positives on choppy oceans. Customs says this is one reason it hasn’t rolled out a Green Lane designation for ships that works like an E-Z Pass lane on a toll road.Meanwhile, some companies are using radio frequency identification (RFID) networks to track shipments. General Motors parts coming from Canada to the United States are carried on tagged trucks. The tag includes the vehicle and container identification numbers (matched to the manifest submitted by the carrier and GM) and a digital photo of the driver. If the picture doesn’t match the driver, or the numbers on the RFID device don’t match the manifest, the load is inspected and the driver questioned by a Customs officer.For intercontinental shipments, an RFID tag can trigger automated alerts when a container enters a terminal equipped with an RFID network. (Without automated alerts, importers might wait days for terminal operators to send their manual alerts after a container arrives in the United States.) Stanford Professor Hau Lee found that with reductions in inventory and pilfering, as well as other savings, companies that use technologies such as RFID can avoid as much as $462 in costs per container. Reusable RFID tags cost between $20 and $150, and networks can cost from $30,000 for a small site to over $1 million. So it will be awhile before RFID is ubiquitous. Related content news North Korean hackers mix code from proven malware campaigns to avoid detection Threat actors are combining RustBucket loader with KandyKorn payload to effect an evasive and persistent RAT attack. By Shweta Sharma Nov 28, 2023 3 mins Malware feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Compliance news GE investigates alleged data breach into confidential projects: Report General Electric has confirmed that it has started an investigation into the data breach claims made by IntelBroker. By Shweta Sharma Nov 27, 2023 3 mins Data Breach opinion A year after ChatGPT’s debut, is GenAI a boon or the bane of the CISO’s existence? You can try to keep the flood of generative AI at bay but embracing it with proper vigilance is likely the best hope to maintain control and prevent the scourge of it becoming shadow AI. By Christopher Burgess Nov 27, 2023 6 mins Generative AI Data and Information Security Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe