
Blue Yonder Cyberattack: How Prepared Are You If Your TMS or WMS Goes Down?
When a cyberattack takes down your TMS, WMS, or other supply chain software (it’s a question of when, not if), will you be ready to

When a cyberattack takes down your TMS, WMS, or other supply chain software (it’s a question of when, not if), will you be ready to

As you read this, I’ll be a few hours into my flight home from Vienna after speaking at the Transporeon Summit. I’ll share some takeaways

John Adams famously said, “Every problem is an opportunity in disguise.” I recalled this quote when I read that Google is reportedly acquiring cloud security

Greetings from Burlington, VT, where the remnants of Hurricane Beryl dumped almost 2 inches of rain on Wednesday, and some additional rain yesterday. It’s dry

In a March 2010 article in The Atlantic titled “Cyber Warriors,” James Fallows writes, “[Cyber] attacks — not just from China but from Russia and

Maybe dying isn’t about not waking up one day; it’s about staying awake forever. Many years ago I wrote a short story that ended with