Articles

Security

PRODUCT SPOTLIGHT | Cargo Security

GT 1210 Solution: ORBCOMM’s system combines asset tracking capabilities with cargo and door sensors. The trailer tracking device identifies door opens, route deviations, and loaded/unloaded status. Real-time alarms protect cargo from theft and tampering. The solution includes a customizable application with dashboards and analytics. IntelliScan Image Capture and Retrieval: Spireon’s cargo sensing technology complements its […]

Read More
AI Strategy: Your Move

AI Strategy: Your Move

Artificial intelligence (AI) spending shows no signs of slowing, with 82% of decision-makers saying they’re very likely to increase their AI investment or capabilities in the next two years, says a report from Modzy. Decision-makers should consider the following factors in their AI strategy, the report says: Recognize the value. About 66% of decision-makers surveyed […]

Read More
The Art of the Steal

The Art of the Steal

With pandemic-induced lockdowns, e-commerce surges, and transportation restrictions in 2020, cargo theft shifted to new commodities and locations (see chart), says a BSI and TT Club report. New trends include the food and beverage sector experiencing the most theft, as well as an uptick in theft from facilities compared to 2019. In the year ahead, […]

Read More

You’ve Got Drone Mail

Many drone delivery services involve dropping packages on the ground outside of homes and businesses, making them vulnerable to theft and bad weather. That’s where the smart drone mailbox comes in. These new mailbox concepts, developed by startups Valqari and DRONEDEK, involve a technology-enabled container that receives and stores packages in a secure, climate-controlled box […]

Read More
John Thielens

How Ransomware Kidnaps Supply Chains

The volume and sophistication of cyberattacks has increased in recent years, but even more so with COVID-19 and the shift to remote work. Most notably, there has been a particularly concerning rise in ransomware attacks.

Read More

How to Protect Your Supply Chain from Cyberattacks

Supply chains have been stretched to their limits by COVID-19 lockdowns, border closures, and sudden shifts in consumer demands. Now, they’re facing a growing threat from hackers. According to the FBI, cyberattacks have surged by 400% during the pandemic. One of the top targets: supply chains. In 2019, there were around 300 major hacks on […]

Read More

Industry Insight

In its 2020 survey covering companies’ priorities and challenges related to cybersecurity, advanced technologies, succession planning, and trade developments, technology company Sikich finds: 50% of manufacturing and distribution executives say they experienced a cyberattack in the past year, but most haven’t taken important cybersecurity prevention measures. 40% say they perform data breach prevention, such as […]

Read More

Great Expectations

Even amid economic uncertainty, shoppers expect global businesses to maintain fast and transparent delivery, improve environmental sustainability, and keep personal data secure, according to new research from project44. Key findings from the report highlight: Fast Deliveries 83% of consumers do not expect companies to give up fast delivery in an economic downturn. 89% do not […]

Read More
David Pignolet

Three Ways to Mitigate Insider Risk in Your Supply Chain

“Insider threat” has long been a familiar security topic for C-suite executives in every industry. In fact, 90% of organizations feel vulnerable to insider attacks, according to IBM. Yet, when creating risk mitigation programs for insider threats, many organizations overlook their nonemployees—the people who work for their third-party vendors, partners, and contractors.

Read More
Julio Casal

What’s Lurking in Your Supply Chain?

You may think your company is well protected when it comes to cybersecurity, but an often overlooked source of vulnerability is your supply chain. If you can’t honestly say you are fully apprised of the security postures of your vendors, partners, and contractors, then you are already at major risk of a cyberattack.

Read More
3 Big Barriers to IIoT Integration

3 Big Barriers to IIoT Integration

From monitoring air quality in "smart cities" like Chicago and New York City to tracking health data in real time on smart watches, the Internet of Things (IoT) is everywhere. IoT applications look promising for the manufacturing industry as well: European aircraft manufacturer Airbus is developing Industrial Internet of Things (IIoT) technologies to provide valuable […]

Read More
John Sheehy

Eight Ways to Minimize Supply Chain Risk

Supply chain attacks aren’t anything new, but threat actors continue to find new ways to breach networks. The 2013 Target breach and more recent NotPetya, Trisis, and Wipro compromises serve as not-so-gentle reminders that supply chain attacks are damaging and costly and present many risks to both businesses and their suppliers.

Read More
Stop, Thief!

Stop, Thief!

TT Club and BSI have issued the second edition of their report on global cargo theft, the first to cover a full year. The report analyzes cargo theft by modality, theft type (modus operandi), commodities targeted, and the value of losses across the major regions of the world (see chart above). Among the notable findings: […]

Read More
Is Your IoT Deployment Secure?

Is Your IoT Deployment Secure?

Transportation and logistics companies recognize they must strengthen their approaches to cybersecurity but are not yet taking the practical steps to safeguard their industrial Internet of Things (IoT) deployments, according to a study done on behalf of Inmarsat. According to the study, which surveyed 125 businesses across the transport industry, 64% of respondents say their […]

Read More

Defending Against Supply Chain Hackers

While your company may have excellent cyber security practices in place, your suppliers may not. These best practices will help protect your company from hackers who attack your supply chain partners. 1. Review Incident Response Plans. Always make sure vendors have an incident response plan in place before conducting business with them. If there is […]

Read More