Sorry, but your login has failed. Please recheck your login information and resubmit. If your subscription has expired, renew here.
January-February 2017
Transformation is a topic that comes up in almost every conversation I have with supply chain managers these days. Executives from companies as diverse as J&J Vision Care, the division of Johnson & Johnson that manufactures contact lenses, and Thrive Markets, a startup selling health and wellness products to its members, have talked about how they have had to remake their supply chains to meet new customer demands. Transformation is also the theme of this issue of SCMR. Browse this issue archive.Need Help? Contact customer service 847-559-7581 More options
Not too long ago, Goodwill Industries found that its customers’ payments data had been breached by cyber criminals. Data from 868,000 payment card accounts was stolen. The entry point for the attack? Hackers had used malware to penetrate a third-party vendor’s systems.
A year earlier, Target made news when it suffered a huge and highly publicized breach in which data from 110 million customers and 40 million payment cards was stolen. The national retailer’s systems were initially breached via a connection with one of its vendors, an HVAC provider.
Goodwill and Target are by no means alone. Cyber breaches are proliferating year over year, affecting the confidentiality, integrity and availability of data; recent research by IBM indicates that just between 2014 and 2015, the number of such security incidents increased by 64%. These statistics probably reveal just the tip of the iceberg; they refer only to the security incidents that are detected and declared.
This complete article is available to subscribers only.
Log in now for full access or start your PLUS+ subscription for instant access.
SC
MR
Sorry, but your login has failed. Please recheck your login information and resubmit. If your subscription has expired, renew here.
January-February 2017
Transformation is a topic that comes up in almost every conversation I have with supply chain managers these days. Executives from companies as diverse as J&J Vision Care, the division of Johnson & Johnson… Browse this issue archive. Access your online digital edition. Download a PDF file of the January-February 2017 issue.Not too long ago, Goodwill Industries found that its customers' payments data had been breached by cyber criminals. Data from 868,000 payment card accounts was stolen. The entry point for the attack? Hackers had used malware to penetrate a third-party vendor's systems.
A year earlier, Target made news when it suffered a huge and highly publicized breach in which data from 110 million customers and 40 million payment cards was stolen. The national retailer's systems were initially breached via a connection with one of its vendors, an HVAC provider.
Goodwill and Target are by no means alone. Cyber breaches are proliferating year over year, affecting the confidentiality, integrity and availability of data; recent research by IBM indicates that just between 2014 and 2015, the number of such security incidents increased by 64%. These statistics probably reveal just the tip of the iceberg; they refer only to the security incidents that are detected and declared.
SC
MR
Latest Supply Chain News
- Made in Mexico, manufactured by China
- Retail sales see gains in October, reports Commerce and NRF
- Balancing green and speed: Home delivery insights from the pandemic era
- AdventHealth named top healthcare supply chain by Gartner
- Geopolitical readiness in supply chains: Strategic challenges for leaders
- More News
Latest Podcast
Explore
Latest Supply Chain News
- Made in Mexico, manufactured by China
- Retail sales see gains in October, reports Commerce and NRF
- Balancing green and speed: Home delivery insights from the pandemic era
- AdventHealth named top healthcare supply chain by Gartner
- Geopolitical readiness in supply chains: Strategic challenges for leaders
- Unlocking retention: The role employee engagement plays
- More latest news