Remove e-Delivery Remove Manufacturing Remove Retail Remove Security
article thumbnail

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

ZLab researchers spotted a new malicious espionage activity targeting Italian companies operating worldwide in the manufacturing sector. This actor was first spotted by PaloAlto’s UNIT42 in 2018 during wide scale operations against technology, retail, manufacturing, and local government industries in the US, Europe and Asia.

article thumbnail

AI in commerce: Essential use cases for B2B and B2C

IBM Big Data Hub

Four AI in commerce use cases are already transforming the customer journey: modernization and business model expansion; dynamic product experience management (PXM); order intelligence; and payments and security. This includes trust in the data, the security, the brand and the people behind the AI.

B2C 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

List of Data Breaches and Cyber Attacks in March 2021 – 21 Million Records Breached

IT Governance

Don’t be fooled by the fact that we only recorded 20,995,371 breached records in March; it was one of the leakiest months we’ve ever seen, with 151 recorded incidents. By comparison, there was a seemingly Lilliputian 82 recorded breaches in January and 118 in February.

article thumbnail

The most valuable AI use cases for business

IBM Big Data Hub

Promote cross- and up-selling Recommendation engines use consumer behavior data and AI algorithms to help discover data trends to be used in the development of more effective up-selling and cross-selling strategies, resulting in more useful add-on recommendations for customers during checkout for online retailers.

article thumbnail

Types of enterprise resource planning (ERP) systems

IBM Big Data Hub

ERP solutions are built to meet the needs of organizations across multiple industries including retail, consumer products, industrial, energy and utilities and government (including defense). An example is manufacturing industry software which includes MRP, or material requirements planning.

Cloud 85
article thumbnail

How to Keep Up with the EDI Renaissance

Rocket Software

Electronic Data Interchange (EDI) plays an essential role in meeting these goals and keeping goods moving from creation to delivery. With EDI, businesses were able to exchange documents and intellectual property (IP) across disparate systems quickly, securely and transparently. In fact, EDI is undergoing a much-needed renaissance.

B2B 87
article thumbnail

The Hacker Mind: Hacking IoT

ForAllSecure

It seems everything smart is hackable, with IoT startups sometimes repeating security mistakes first made decades ago. How then does one start securing it? Welcome to the hacker by original podcast from for all secure, it's about challenging our expectations about the people who hack for a living.

IoT 52