Moving freight in 2022 can be a tricky business. Not only are ongoing supply chain slowdowns generating opportunities for cargo thieves, but in today’s day and age, increased reliance on technology brings a whole new set of vulnerabilities with it.
The weeks of empty grocery shelves during the pandemic prove the fragility of the basic supply chains that impact Americans daily. But national security won’t be achieved until each citizen is made secure by the free and dependable flow of necessities.
Four steps to building cyber-resiliency for supply chains to prevent exploitation and protect critical information.
Here are three cybersecurity best practices for protecting the supply chain that will help manufacturers continue to innovate, create new products and services, increase profitability, while maintaining a competitive edge.
From smart devices that support supply chain visibility to bar seals that secure shipping containers, these products keep your cargo safe.
How do we defend dynamic threats to the backbone of how we consume goods and services? Here are tips to achieve a secure and available supply chain.
The volume and sophistication of cyberattacks has increased in recent years, but even more so with COVID-19 and the shift to remote work. Most notably, there has been a particularly concerning rise in ransomware attacks.
Half of manufacturing and distribution executives experienced a cyberattack in the past year, but most haven't taken important cybersecurity prevention measures. What other challenges are leaders facing when it comes to cybersecurity, advanced technologies, succession planning, and trade developments?
An often overlooked source of security vulnerability is your supply chain. If you can’t honestly say you are fully apprised of the security postures of your vendors, partners and contractors, you are at major risk of a cyberattack.
Keeping your cargo safe from theft is a bigger challenge than you might think. Follow these steps to reduce the risks that make your company a target.
Hackers can shut down entire organizations by infiltrating systems, locking down digital assets, and making all files and folders inaccessible. No fulfillment. No new client acquisition. No checking inventory. Here's how to make sure that doesn’t happen.
Recent randomware attacks reveal vulnerabilities in manufacturing, logistics and supply chain security.
As organizations continue to outsource, form partnerships and share data with third parties, a strong vendor risk management program that stays ahead or risks in the information supply chain has to be a top priority.
New Year supply chain health check; DHL uses penguins to train couriers; Ocean Alliance receives FMC approval; Veterans make better truck drivers than non-veterans; Cyberattacks focusing on weak supply chain links
The U.S. Bureau of Industry and Security revised almost every section of the U.S. Export Administration Regulations (EAR) on Sept. 20, 2016. Here’s what shippers need to know.
Keeping cargo secure requires visibility and the automation technology to enable this view into your shipments. Additionally, immediate access to rapidly changing requirements for import and export activities plays a key role in light of new security concerns.
U.S. chemical manufacturers and distributors must comply with two sets of regulations affecting chemical shipments. Here's how to stay compliant, efficient, and safe.
New technology enables new advances in supply chain security. What will security look like in 2025?
Vulnerable to cargo theft? This monitoring solution provides layers of assurance for shippers and transporters.
So how prepared is your business to withstand a crisis? Effective risk analysis and crisis preparation is an essential strategy.
To help combat counterfeiting, the premium beverage industry is taking advantage of serial numbers on product packages to uniquely identify each product for increased connectivity throughout packaging operations and the supply chain.
As cyber crime and data breaches continue to climb, supply chain information is increasingly at risk. Here are ways to assess your vulnerability and keep supply chain data safe from hackers.
Keep these trends in mind when selecting an air logistics supplier to find the best solution to suits your needs
Supply chain continuity planning is critical for global businesses. Armed with an end-to-end digital model of their supply chains, shippers can react rapidly and intelligently when unplanned events occur.
An on-board video solution helps fleet managers review driver performance and improve fleet safety.
Freight damage, loss, and theft will always occur. Planning for those inevitabilities is key to prevention and faster claims settlement.
Minimizing employee downtime with ergonomic initiatives and equipment can have a big impact on the bottom line.
These four tips can help you make sure your specialized shipment arrives safely and on time.
Successful companies are concerned about supply chain security. Here’s how to prevent supply chain threats from negatively impacting your company’s bottom line and reputation.
Shipment monitoring tools allow manufacturers and shippers to locate cargo, manage inventory and prevent theft.
Shippers and logistics providers take extra precautions to protect high-value products from cargo theft.
Hunter Harrison documents the culture change that has contributed to Canadian Pacific’s rail renaissance; Global companies more concerned about climate risk than emissions reductions; Deadline for new ISO17712:2013 high-security seal standards is fast approaching; Lack of collaboration between supply chain and finance hurts the bottom line
Ensuring supply chain security requires that shippers and logistics providers stay one step ahead of thieves.
Shippers protect against supply chain disruptions with physical, analytical, and financial risk mitigation strategies.
The 2013 Rail Trends conference addressed issues of rail safety and regulation.
Knowing your global trading partners can help maintain a smooth flow of goods, while ensuring safety and security.
Actionable tips help you revitalize your warehousing, 3PL, trucking, and global logistics operations.
Railroads are investing in new safety processes, technology and policies to ensure cargo security and prevent accidents.
C-TPAT certification lets businesses support national security and improve their own supply chain operations.
To ensure cargo security in the global supply chain, understanding the challenges, studying best practices, and putting a comprehensive plan in place are critical components.
Supply chain partners are taking cues from U.S. Customs and Border Protection and making concerted efforts to share and apply security best practices throughout their organizations and supply chain operations, says Howard Finkel of COSCO Container Lines Americas.
The Transported Asset Protection Association (TAPA) unites global manufacturers, carriers, insurers, and service providers to reduce the risks of criminal activity against high-value cargo in the transportation supply chain, writes Lisa Greenleaf of TUV Rheinland of North America.
The growth of global trade and sourcing creates more security vulnerabilities within the supply chain. Aggressive thieves with sophisticated techniques have spurred innovation in shipment processes, technology, and regulatory measures.
In an exclusive interview with Inbound Logistics, Dennis Omanoff, senior vice president, chief supply chain officer, chief procurement officer, corporate facilities and real estate for McAfee Inc., shares his view of supply chain management, security, and the U.S. business climate.
The logistics sector is using new approaches, mandates, and technologies to support global supply chain security.
Air cargo security requires aggressive international mandate and top-down focus on identity verification and data analysis, writes Steve Vinsik of Unisys Corporation.
Shippers can ensure ocean cargo security by taking steps such as using C-TPAT checklists, performing random container inspections, applying security seals, shipping through secured ports, conducting security training, and following U.S. Customs and Border Protection guidelines.
Motor freight carriers employ a variety of strategies to keep cargo secure in transit, writes Editor Felecia Stratton.
If your business plans include shipping to areas where civil unrest or natural disasters have occurred, be flexible and make strong connections, advises Larry Wenrich, Pilot Freight Services.
Since the events of September 11, the public and private sectors have committed themselves to developing new supply chain security technologies.
As You Sow asks P&G and General Mills to recycle post-consumer waste; PepsiCo and Coca-Cola make bottles out of plants; Air cargo industry raises concerns about the Transportation Security Administration’s 100-percent screening mandate; Truckers report increasing volumes and rates; TMS market shows signs of rebound; CN invests in new intermodal equipment, new customers; Amazon vacates S.C. DC over sales tax
Equipping shipments with container security devices (CSDs) can help expedite inspections, decrease insurance premiums, and minimize supply chain disruptions. Jim Giermanski of Powers Global Holdings outlines the benefits of CSDs.
Troy Ryley and Jose Minarro, managing directors for Transplace Mexico, offer tips for shipping freight cross-border and within Mexico.
Industry experts explain how to avoid threats to warehoused goods, conduct a global security assessment, and benefit from renewed government and private sector attention to supply chain security initiatives.
Dubai makes progress on its first aerotropolis, Starbucks partners with China to set up its first coffee bean farm, Canadian National accelerates auto imports, United Kingdom and France work to counter terrorism, Marks & Spencer accelerates supply chain improvement plan
U.S. Department of Transportation pursues ban on cell phone use while driving; Proposed air cargo screening legislation enhances security measures; U.S. retailers place increased emphasis on supply chain management
Increased regulation in the form of CSA 2010 affects not only truckers, but also freight brokers providing insurance, according to Mike Williams, chief operating officer, Sunteck Transport Group.
A steady stream of goods passing north and south across the U.S.-Canada border stitches the two nations tightly together, complicated by factors such as customs regulations, security protocols, data exchange, and infrastructure projects.
Global supply chain visibility and detail can only be achieved by modern electronic data transmissions that are already available and can reduce the costs of international cargo movement.
The Transportation Security Administration's air cargo screening requirements create challenges for airports and shippers, writes Robert F. Caton of AMB Logistics.
The commodities markets are the industry category that is experiencing the greatest strain as a result of Russia's invasion of Ukraine, according to a Dun & Bradstreet briefing report released in March 2022. The report, which assesses the global business impact of the crisis, focuses on the businesses and countries that work with Russian and Ukrainian suppliers.
Proper logistics management can be one of the most critical aspects of a successful IT asset disposition (ITAD) program.
Add capacity constraints, severe weather, and cyberattacks into the already complex equation of moving chemicals. These logistics providers are combining expertise and dedication and coming up with the winning formula.
Artificial intelligence spending shows no signs of slowing. Decision-makers should consider the following factors in their digitization strategy.
With pandemic-induced lockdowns, e-commerce surges, and transportation restrictions in 2020, cargo theft shifted to new commodities and locations.
Supply chains have been stretched to their limits by COVID-19 lockdowns, border closures, and sudden shifts in consumer demands. Now, they’re facing a growing threat from hackers. The fastest-growing threat is ransomware, which encrypts a company’s data until a ransom is paid to the hackers to decode it.
Without proper identity access and management procedures for third-party users in place, entire supply chains are vulnerable to attacks.
Security, reliability, and scalability are three barriers that can prevent industrial companies from integrating Industrial Internet of Things (IIOT) solutions.
Your company can be exposed to unpredictable theft at any time, which can negatively impact your revenues and your reputation. Here are some simple tips to help protect your shipments, customers, and industry stature.
Today’s supply chains are among the most exposed to the risks of digital disruption. The complexity and multi-layered nature of supply chains have made them an obvious mark for attack as well as one of the most complex targets to defend.
The logistics sector’s reliance on relationships, email, and spreadsheet attachments makes it particularly vulnerable to cyberattacks. And the costs are staggering. Find out what shippers can do to make communications more secure.
Supply chains are heavily dependent on information technology (IT) systems, but are difficult to secure because they often involve multiple networks working together.
New mailbox designs involve a technology-enabled container that receives and stores packages delivered via drone in a secure, climate-controlled box accessible only by the recipient.
Even amid economic uncertainty, shoppers expect global businesses to maintain fast and transparent delivery, improve environmental sustainability, and keep personal data secure, according to new research from project44
Consider all potential disruptions and ways to design your supply chain to keep it operational in the face of foreseeable and unforeseeable challenges.
Transportation and logistics companies recognize they must strengthen their approaches to cybersecurity but are not yet taking the practical steps to safeguard their industrial IoT deployments
One of the biggest issues that will quickly come to the forefront in 2019 is cybersecurity for the supply chain.
Applying these tips to your supply chain will boost your overall security. It won't be hackerproof, nothing is, but it will deter plenty of them.
Three main ways that managed security services can save a business from the disaster of data loss.
The use of analytics to mitigate third-party supply chain fraud, waste, and abuse risk has increased.
IBM builds proof-of-concept blockchain supply chain network in Singapore; U.S. fashion industry association releases fourth fashion industry benchmarking study; E-commerce retailers target Germany