Supply chain analytics: 5 tips for smoother logistics

Supply chain analytics: 5 tips for smoother logistics

The worldwide supply chain challenges that plagued companies in multiple industries throughout 2021 are continuing this year. One potentially effective solution for addressing supply and demand issues is to leverage data analytics. Professional services and consulting firm KPMG in a recent report notes that several major disruptions are currently affecting supply chains. These include the ongoing global logistics disruptions stemming from the COVID-19 pandemic that continue to impact businesses and consumers — as the flow…

Read More

What’s the Secret to Achieving Operational Resilience?

What’s the Secret to Achieving Operational Resilience?

According to Gartner, operational resilience is defined as “initiatives that expand business continuity management programs to focus on the impacts, connected risk appetite, and tolerance levels for disruption of product or service delivery to internal and external stakeholders.” If the word “disruption” sounds familiar, it’s because we’re living in one of the most volatile times in recent history. The COVID-19 pandemic created major challenges for supply chains and third-party relationships, which in turn has had…

Read More

FBI: Beijing Games Athletes Should Leave Devices at Home

FBI: Beijing Games Athletes Should Leave Devices at Home

US law enforcers are urging participants at the Beijing Winter Olympics to leave their devices at home after warning of potential state-backed and cybercrime activity at the event. An FBI alert issued yesterday claimed it was aware of no specific threat to the games but urged “partners” to remain vigilant. While strict Communist Party COVID restrictions mean no foreign spectators will be allowed to attend the Olympics or Paralympics, athletes could be targeted, the Feds…

Read More

Tripwire Patch Priority Index for January 2022 | The State of Security

Tripwire Patch Priority Index for January 2022 | The State of Security

Exploit Framework – Metasploit CVE-2021-44228 Windows HTTP Protocol Stack CVE-2022-21907 PolicyKit (polkit) – Local Privilege Escalation CVE-2021-4034 Microsoft Edge (Chromium-based) CVE-2022-0108, CVE-2022-0109, CVE-2022-0104, CVE-2022-0105, CVE-2022-0106, CVE-2022-0107, CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103, CVE-2022-0120, CVE-2022-0113, CVE-2022-0112, CVE-2022-0111, CVE-2022-0110, CVE-2022-0117, CVE-2022-0116, CVE-2022-0115, CVE-2022-0114, CVE-2022-0118, CVE-2022-0098, CVE-2022-0099, CVE-2022-0096, CVE-2022-0097 APSB22-01 CVE-2021-44701, CVE-2021-44702, CVE-2021-44703, CVE-2021-44704, CVE-2021-44705, CVE-2021-44706, CVE-2021-44707, CVE-2021-44708, CVE-2021-44709, CVE-2021-44710, CVE-2021-44711, CVE-2021-44712, CVE-2021-44713, CVE-2021-44714, CVE-2021-44715, CVE-2021-44739, CVE-2021-44740, CVE-2021-44741, CVE-2021-44742, CVE-2021-45060, CVE-2021-45061, CVE-2021-45062, CVE-2021-45063, CVE-2021-45064, CVE-2021-45067, CVE-2021-45068 Microsoft Office Word CVE-2022-21842…

Read More

Making Progress Securing Our Nation’s Water Supply

Making Progress Securing Our Nation’s Water Supply

Water and wastewater treatment may not be at the top of most people’s list of discussion topics, but the more you think about it, the more clear it becomes that this particular subsegment of the utilities market is a vital part of our critical infrastructure. We rely on the ability to turn on the tap and get clean, safe water every day. And we’ve seen what havoc losing that ability can wreak from the crisis…

Read More

CISA Tells Organizations to Patch CVEs Dating Back to 2014

CISA Tells Organizations to Patch CVEs Dating Back to 2014

The US government has added eight more vulnerabilities to its growing list of CVEs that must be patched by federal agencies, including some that first appeared eight years ago. The Cybersecurity and Infrastructure Security Agency (CISA) first launched its Known Exploited Vulnerabilities Catalog in November 2021 as part of a government effort to enhance cyber-resilience. The Binding Operational Directive (BOD) 22-01 that enabled it applies only to civilian federal agencies, but all organizations are encouraged to monitor the…

Read More

5 minutes with Ara Ghazaryan: Mitigating artificial intelligence concerns

5 minutes with Ara Ghazaryan: Mitigating artificial intelligence concerns

5 minutes with Ara Ghazaryan – Mitigating artificial intelligence concerns | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

A CISO’s guide to information sharing

A CISO’s guide to information sharing

A CISO’s guide to information sharing | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

The state of the workforce: Hiring, rehiring and retaining qualified security

The state of the workforce: Hiring, rehiring and retaining qualified security

The state of the workforce: Hiring, rehiring and retaining qualified security | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Does Workload Placement Define the Cloud Principles? What Do You Think?

Does Workload Placement Define the Cloud Principles? What Do You Think?

By Richard Amos On-demand automated self-service, elasticity, utilization transparency, and resource pooling are all core aspects of workload efficiency. It was the public cloud providers that initially improved upon the. these concepts, propelling a new way of working that enabled organizations to scale. Embed micro-services, containerization, Agile, and DevOps within this transformation and suddenly technology’s ability to deliver new business outcomes could approach demand from business counterparts.  With the evolution of cloud computing and the…

Read More
1 3,226 3,227 3,228 3,229 3,230 4,019