News
Third-party attacks are one of the most prominent trends within the threat landscape, showing no signs of slowing down, as ...
True transformation in high-risk industries heavily reliant on supply chains depends not just on technology but on people.
The time has come for cybersecurity professionals to rethink their approach to supply chain security. Traditional vendor risk management practices are no longer sufficient in today's threat landscape.
Incoterms create a competitive advantage and mitigate risk in standard operating procedures for global supply chain ...
1. Default risk. Bloomberg’s proprietary default risk model uses inputs such as a company’s debt to calculate default probability. By combining supply chain and default risk data, we can ...
Blue Yonder, the world leader in end-to-end digital supply chain transformation, launched several new solutions and showcased its vision to build the supply chain of the future at ICON 2025, its ...
The Covid-19 pandemic exposed vulnerabilities in global supply chains, highlighting the urgent need for a comprehensive approach to third-party risk management (TPRM).
The basic performance of the supply chain was stable enough that it was often taken for granted. Everything has changed. At first that change was dramatic, but there is no "return to normal" for ...
Bridget McCrea is a Contributing Editor for Logistics Management based in Clearwater, Fla. She has covered the transportation and supply chain space since 1996 and has covered all aspects of the ...
Research in APIs, Rust programming, large language models for secure code, and community events support building security into the software development lifecycle.
NASHVILLE, Tenn. & DALLAS--(BUSINESS WIRE)--Blue Yonder, the world leader in end-to-end digital supply chain transformation, launched several new solutions and showcased its vision to build the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results