Security

Cybersecurity, physical security, supply chain security (e.g. cargo theft, counterfeiting, etc.)
Secondarily, geopolitical security

Geospatial Intelligence: Part Six – Supply Chain Safety and Security

Geospatial intelligence can be used to detect, deter, and counteract cargo and equipment theft, fraud, kidnappings and hijackings, mishandling of products, and IP theft using tools such as asset monitoring, geofencing, supply chain monitoring, and other means. It can also help in enabling employee communications and safety during natural disasters and other emergencies.

Going too Far with Technology – Trends 2020

Even the most enthusiastic technology developers are having second thoughts about some of the wondrous things they have developed. When created, most developers dreamed of all the benefits technology would bestow upon humankind, but it is also true that in the wrong hands, things can go terribly wrong. And the fact is, we don’t seem to have prevented that from happening. Are we doomed to a dystopian technological future?

Blockchain, Identity, and CSR in 2018

Here we explore three topics we believe will be key in 2018: Blockchain (and its use cases for supply chain), trends in Identity Management, and the increasing importance of Corporate Social Responsibility for our supply chains and the world.

The Russians Are Coming?

Stealing trade secrets, patent infringements, piracy, counterfeiting and product tampering damage companies, make people ill, and deflate honest competition. And if financial and trade hacks are not enough, we now fear that our IoT devices can be hacked. Most of all, hacking/stealing trade secrets and hijacking product quality challenge the very notion of innovation, capitalism and free trade–the system that has modernized the world since the industrial revolution and catalyzed the information age.

Blockchain Gets Real

The Depository Trust and Clearing Corporation (DTCC) facilitates post-trade processing for over 98% of all credit derivatives worldwide (over $11 trillion). Last week, they announced (together with IBM) that DTCC is moving their credit derivatives Trade Information Warehouse (TIW) service off their legacy relational database and online transaction processing technologies and onto a distributed ledger, based on blockchain technology. That is a big deal for blockchain.

A Framework for Securing the Industrial Internet of Things

The publication of the Industrial Internet Security Framework by the IIC is a vital early step towards creating security in the Industrial IoT. Strong security becomes increasingly crucial as more and more critical infrastructure becomes connected and remotely controllable.

The IoT Security Imperative – Part 1: Physical-Cyber Risk Landscape

With the current state of IoT security, we might call it the Internet-of-Vulnerable-Things. It’s all the more alarming because of the types of physical machines/systems that are increasingly network-connected–traffic lights, airplanes, nuclear power plants, and other critical or potentially lethal systems. In part one, we discuss the nature of the challenge.

Supply Chain Risk Now?

The supply chain business community now includes Risk Management as a business priority and cites it as a key area in need of improvement. Are solution providers ready?

Scroll to Top