The publication of the Industrial Internet Security Framework by the IIC is a vital early step towards creating security in the Industrial IoT. Strong security becomes increasingly crucial as more and more critical infrastructure becomes connected and remotely controllable.
Anything related to managing and avoiding risks, but especially supply chain risk
Beyond The Control Zone – Part One
In an outsourced and virtual world many critical operations and data are outside our control. However, supply chain managers need to gain control in order to ensure better outcomes.
The Coming Wave of Pharma Supply Chain Regulations: Insights from TraceLink NEXUS ’15
New regulations across the globe are coming into effect, requiring pharmaceutical manufacturers, distributors, dispensers, and others up and down the chain to build serialization, verification, and traceability into the supply chain. At TraceLink’s NEXUS ’15 conference, we learned a lot about the impact of these new requirements, how companies are responding, and whether there is an ROI beyond compliance.
The IoT Security Imperative – Part 3: IoT Platform Security Requirements
IoT platforms, outside of the devices themselves, comprise the bulk of the intellectual property, infrastructure, and complexity in IoT. We examine requirements that are needed to ensure security in these platforms.
The IoT Security Imperative – Part 2: Device Security Requirements
Control over physical devices is what makes IoT different, and more dangerous, than traditional IT software. Here we look at device-level security requirements for makers of IoT-enabled products and services.
The IoT Security Imperative – Part 1: Physical-Cyber Risk Landscape
With the current state of IoT security, we might call it the Internet-of-Vulnerable-Things. It’s all the more alarming because of the types of physical machines/systems that are increasingly network-connected–traffic lights, airplanes, nuclear power plants, and other critical or potentially lethal systems. In part one, we discuss the nature of the challenge.
Hacking Reaches out Beyond Retail
Hacking reaches into every aspect of consumer data&.
Supply Chain Risk Now?
The supply chain business community now includes Risk Management as a business priority and cites it as a key area in need of improvement. Are solution providers ready?
Highlights From DocuSign MOMENTUM 2015
DocuSign’s 2015 MOMENTUM conference showed us how they are transforming companies (and lives). There were numerous customer examples to learn from.
Looking Forward: The Challenge of the Decade–Cyber Security
New types of challenges confront technology users. These challenges call for new and effective technologies to identify, authenticate, and protect people, assets and information.
Managing Cyber Risks – Not Just for Big Retailers
Both B2C and B2B companies need to focus on risk.