News

To secure valuable data, organizations need to implement digital trust in software supply chains; however, several key ...
This Accelerator is an in-depth analysis into data from the 2025 LevelBlue Futures Report, comparing risk appetites, ...
“Addressing this ongoing problem requires a continued focus on creating clear career paths for women; actively promoting ...
This article discusses open source software supply chain attacks and proposes a general taxonomy describing how attackers conduct them. We then provide a list of safeguards to mitigate such attacks.
Schneider Electric holds the No. 1 spot for the third year in a row on Gartner’s 2025 Global Supply Chain Top 25, with NVIDIA jumping to second place. The annual list, released today, highlights ...
Explore how smart firms are turning to digital tools and AI to gain agility and outmaneuver global trade volatility, tariffs, ...
The Supply chain attack is the stealthy and sophisticated cyberattack that aims to compromise a target by exploiting weaknesses and vulnerabilities in its supply chain. Recent supply chain attacks ...
PLM (Product Lifecycle Management) technology is key to creating ecologically-conscious principles at the forefront.
Supply chain leaders are being urged to take action as the Israel-Iran conflict continues to disrupt key shipping routes and push up costs. According to a new report from Gartner, there are three big ...
The corporate world is grappling with an unprecedented surge of software supply chain attacks— 45% of organizations are predicted to face such breaches this year. The problem intensifies as ...
TL Consulting has boosted its supply chain software capabilities through partnering with JFrog after using its solutions for 10 years. The collaboration enables Asia Pacific (APAC) based companies ...
Supply chain configurations of foreign cosmetics companies operating in China / Cindy Fang [and others] -- Structural supply chain collaboration among grocery manufacturers / Timothy M. Laseter and ...