Herndon, Va. – Over the past several years, executives across industries have seen the impact that supply chain disruptions – from natural disasters to port strikes – can cause so it’s not surprising that 35 percent ...
At 85.6 per cent, the proportion of supply chains exposed to elevated, high or severe risk of natural disaster is highest for the apparel sector, as it has a high proportion of manufacturing and raw material sourcing based in politically ...
Tags: BSI, apparel sector, raw material
New Kongsberg information management system for the world’s largest cruise ship Friday, Feb 21, 2014 Dragutin Radobuljac, the Chief Electrical Engineer on Royal Caribbean Cruise Line’s mega cruise ship the Allure of the Seas, ...
Tags: Information Management System, Cruise Ship, RCCL, RCUs
Google chairman Eric Schmidt has claimed that Android smartphones have better security than that of Apple's iPhone. Schmidt made the statement at Gartner Symposium/ITxpo in Orlando, Florida during a question and answer session following a ...
Tags: Computer Products, Google
The average cost of a data breach for a UK organisation has risen to over £2m, with human error responsible for the vast majority of cases. That's according to a new report, the 2013 Cost of Data Breach Study, by internet security ...
Tags: Data Breach, Cost
The UK Defence Committee is urging the Government to be more vigorous in its approach to cyber threats. A new report released by the Committee says that the British military is now too dependent on information and communications ...
Tags: military, IT, cyber threats, information, communications technology
There has been an unprecedented volume of malicious code and attacks - including many high profile incidents - in the Middle East during 2012. Attacks ranged from those performed by cyber criminals to hacktivists and in some cases ...
Tags: malicious code, malicious attacks, high profile incidents, IT Security
Pacemakers from several manufacturers can be commanded to deliver a deadly, 830-volt shock from someone on a laptop up to 50 feet away, the result of poor software programming by medical device companies. The new research comes from ...
Tags: Pacemakers, shock, laptop, software programming, medical device companies
Years ago the typical hacking scenario involved a lone attacker and maybe some buddies working late at night on Mountain Dew, looking for public-facing IP addresses. When they found one, they enumerated the advertising services (Web server, ...
Customers and end-users are having the wool pulled over their eyes by organisations that fail to report data breaches, according to Simon Bain, CTO of document management firm Simplexo. The EU information security agency Enisa recently ...
Tags: data breaches, arrogant firms, customers
Nintendo's new games console,the Wii U,has apparently had its user network cracked within hours of the machine's retail release,and by only a regular end user who reached debug menus by accident. A poster going by the name of Trike on ...
Tags: Nintendo, gaming forum NeoGAF, hacks, UK
The U.S.and China are likely to resolve the conflict over potential security threats from Huawei Technologies'network equipment without a trade war,Cisco Systems chairman and CEO John Chambers said on Tuesday. A U.S.Congressional report ...