Tuesday, April 15, 2025 · Dean Weber, Edward Chua, Beth Musumeci, Megha Kalsi, & Edward Watabe
Tariff-related uncertainty can distract businesses, creating opportunities for cybercriminals to exploit vulnerabilities in corporate and supply chain security. Cybersecurity experts from AlixPartners share strategies to protect your supply chain.
Monday, October 7, 2024 · Seongkyoon Jeong
Cybercriminals exploit the relationships between companies and suppliers to infiltrate critical systems, often causing significant operational and financial damage. Businesses must assess the specific risks they face and the role their suppliers play in these scenarios.
Monday, August 5, 2024 · Seongkyoon Jeong
Similar to traditional Bill of Materials practice, the Software Bill of Materials (SBOM) details the required software modules for a product, helping organizations understand the components within their software and better track vulnerabilities.
Monday, November 3, 2014 · Patrick Burnson
A significant milestone for both the United States and Mexico and the facilitation of secure trade between the two countries has been reached
Saturday, November 1, 2014 · Jim Rice
The recent cyber attacks and security breaches at Target and Home Depot drew executives’ attention to the vulnerability of their companies to this type of crime. The incidents exposed some 40 million and 56 million credit cards respectively, and in the case of Home Depot,…