Procurement and Sourcing, Supply Chain

Supply Chain Threats – Test, Provision, andValidation

April 15, 2022

Supply Chain Threats
Supply Chain security is an area of significant focus and scrutiny today. A number of recent significant attacks against both hardware and software supply chains have further exposed the criticality of understanding the threats posed against manufacturers and providing sufficient mitigations. Understanding and mitigating supply chain threats starts with simply identifying the threats. The purpose of this document is to further expand on prior work and dive into the testing, provisioning, and
validation phases. These phases represent potentially the most significant threat against products as they are often conducted, at least in part, by external organizations. Without an understanding of all the known threats currently present, it would be impossible to make any assertions regarding the overall security of products and their associated supply chain

Spotlight

FedEx Services

Please follow the official FedEx LinkedIn Company Page for updates, product and service information, operating company news and regular content: https://www.linkedin.com/company/fedex/ Be sure to visit the official page and join the conversation! We look forward to seeing you...

OTHER WHITEPAPERS
news image

Smart highways reduce congestion and save lives

whitePaper | July 14, 2022

The good news is that developments in ITS, the Internet of Things (IoT), Artificial Intelligence (AI) and advances in exciting areas such as driverless cars and vehicle-to-vehicle (V2V) communication will help alleviate congestion, reduce accidents and increase safety. As states struggle to balance funding priorities, including transportation, ITS technology and the emerging IoT ecosystem can enhance investments in transportation infrastructure, which is critical to the economic and social fabric of the U.S. and safe travel. For example, active traffic management, which includes advance notice about traffic conditions to motorists using variable speed limits, lane management signs and overhead message signs, has reduced collisions and congestion in the Seattle I-5 corridor. Similar initiatives are emerging elsewhere. Around the world the ITS ecosystem is making a difference.

Read More
news image

Scudo: A Proposal for Resolving Software Supply Chain Insecurities in Vehicles

whitePaper | July 15, 2022

For many years supply chain security appears to have been something of a second-tier priority for both software developers and the companies that rely upon their product. It was more common to focus attention on what happens after the software is built, through code reviews, penetration testing, and the development and implementation of patches and updates. This type of approach overlooks the very real possibility that, even with all the efforts mentioned above, end users still have no guarantee they are actually installing the application originally conceived as a code base. Over time, this somewhat myopic vision has given malicious actors multiple opportunities to insert malware or damage images. But, recent events have rapidly forced the industry to take a wider perspective on how software security is defined.

Read More
news image

Securing the Software Supply Chain: Recommended Practices Guide for Developers

whitePaper | August 22, 2022

Cyberattacks are conducted via cyberspace and target an enterprise’s use of cyberspace for the purpose of disrupting, disabling, destroying, or maliciously controlling a computing environment or infrastructure; or destroying the integrity of the data or stealing controlled information.1 Recent cyberattacks such as those executed against SolarWinds and its customers.

Read More
news image

The mindset shift towards innovation A set of guidance fact sheets for ports

whitePaper | October 10, 2022

Since the world’s port community gathered at the IAPH 2022 Conference in Vancouver last May, our technical committees have continued working on their extensive programs with the aim of closing the gaps of port competitiveness in terms of both physical and digital infrastructure. Alongside our core themes of climate and energy, data collaboration and risk and resilience, the fourth major conference theme focused on business innovation. Innovation crosses the boundaries of all our three core IAPH themes and is the key to business improvement

Read More
news image

Building the supply chain forward Strategies to mitigate disruption in automotive logistics

whitePaper | April 14, 2022

The automotive supply chain is surrounded by rising uncertainty. Global freight, material and energy networks face significant imbalances and congestion. The industry is struggling with whiplash between shutdowns and pent-up demand in the wake of the Covid-19 pandemic – resulting in constraints in the upstream supply of components, higher logistics costs and production losses, as well as depleting finished vehicle inventory.

Read More
news image

Improving cyber resilience in maritime industry

whitePaper | November 14, 2022

The guidelines provide high-level recommendations on maritime cyber risk management to safeguard shipping from current and emerging cyber threats and vulnerabilities and include functional elements that support effective cyber risk management. The recommendations can be incorporated into existing risk management processes and are complementary to the safety and security management practices already established by IMO.

Read More

Spotlight

FedEx Services

Please follow the official FedEx LinkedIn Company Page for updates, product and service information, operating company news and regular content: https://www.linkedin.com/company/fedex/ Be sure to visit the official page and join the conversation! We look forward to seeing you...

Events