
Cyber Attackers Exploit ‘Power of the Network’ Too
I’ve written extensively about Supply Chain Operating Networks and “the power of the network.” Instead of companies creating hundreds or thousands of one-to-one connections with

I’ve written extensively about Supply Chain Operating Networks and “the power of the network.” Instead of companies creating hundreds or thousands of one-to-one connections with

In June 2024, we asked members of our Indago supply chain research community — who are all supply chain and logistics executives from manufacturing, retail,

Note: Today’s post is part of our “Editor’s Pick” series where we highlight posts published by our sponsors that provide practical knowledge and advice on

When a cyberattack takes down your TMS, WMS, or other supply chain software (it’s a question of when, not if), will you be ready to

John Adams famously said, “Every problem is an opportunity in disguise.” I recalled this quote when I read that Google is reportedly acquiring cloud security

In a March 2010 article in The Atlantic titled “Cyber Warriors,” James Fallows writes, “[Cyber] attacks — not just from China but from Russia and