Which countries are more at risk in the global supply chain?
Using firm-level data from the global supply network, researchers from the Complexity Science Hub (CSH) quantified countries' exposure to production losses caused by firm defaults in other countries. According to their findings, wealthy nations are o.....»»
Apple pushes suppliers with new iPad Pro OLED process as iPhone 16 picks up new display driver provider
Anyone following Apple supply chain reports knows that the company has been working toward adopting OLED displays on the iPad Pro for quite some time. Though the iPhone has featured an OLED display since the 2017 iPhone X, bringing the technology to.....»»
Stellantis hires engineers in Brazil, India for $53,000 a year to save costs
Stellantis is pursuing an aggressive cost-cutting program and is said to want to have roughly two-thirds of the company’s engineers in lower-cost countries over the longer term......»»
Veracode platform enhancements help organizations reduce application risk
Veracode announced platform innovations that set a new standard for developer-powered application security. New repo risk visibility and analysis from Longbow Security, powered by Veracode, speeds up remediation of application risk from code reposito.....»»
Lineaje OSM improves software supply chain security
Lineaje unveiled Open-Source Manager (OSM), which brings transparency to open-source software components in applications and proactively manages and mitigates associated risks. Lineaje’s OSM enables full lifecycle governance of open-source software.....»»
Snyk AppRisk Pro leverages AI and third-party integrations for faster risk mitigation
Snyk has released Snyk AppRisk Pro, pairing artificial intelligence (AI) with application context from third-party integrations to help application security (AppSec) and development teams address business-critical risk and accelerate fixes. Snyk AppR.....»»
Venafi launches 90-Day TLS Readiness Solution
Venafi launched its new 90-Day TLS Readiness Solution to help organizations comply with Google’s proposed 90-day TLS certificate standard, improving security posture while reducing the risk of certificate-related interruptions. According to a V.....»»
Securing your organization’s supply chain: Reducing the risks of third parties
When Stephen Hawking said that “we are all now connected by the internet, like neurons in a giant brain”, very few people understood the gravity of his statement. But ten years on from his famous interview with USA Today, it’s safe to say Hawki.....»»
Cadillac could keep selling gas vehicles past 2030 all-EV goal
GM's luxury brand has said it aims to have an all-EV portfolio by the end of the decade, but Cadillac's global vice president said electric and gasoline models "will coexist for a number of years.".....»»
Feathers, cognition and global consumerism in colonial Amazonia
Amazonia is the home of the largest variety of birds in the world. In such a unique environment, craft cultures have flourished by translating the beauty and creativity of environmental materials like feathers into stunning pieces of art......»»
Mazda teases an EV Mazda6 sedan with China show car
Mazda plans to launch a second battery-electric vehicle this year. The Mazda EZ-6 sedan is bound for China but could foreshadow how the Japanese company handles a wave of global EVs eventually landing in the U.S......»»
Satellite images of plants" fluorescence can predict crop yields
Cornell researchers and collaborators have developed a new framework that allows scientists to predict crop yield without the need for enormous amounts of high-quality data—which is often scarce in developing countries, especially those facing heig.....»»
Texans should prepare for hotter temperatures, greater risk of fire and flooding
Weather conditions across the Lone Star State are getting more extreme and more dangerous by the year, according to a new report from Texas A&M University professor and State Climatologist John Nielsen-Gammon......»»
Why cloud vulnerabilities need CVEs
When considering vulnerability management’s purpose in a modern world, it’s imperative to recognize the huge transition to new technologies and how you manage risk within these different paradigms and environments (e.g., the cloud). Patch net.....»»
DEA to reclassify marijuana as a lower-risk drug, reports say
Marijuana to move from Schedule 1, the most dangerous drug group, to Schedule 3. Enlarge / Medical marijuana growing in a facility in Canada. (credit: Getty | Richard Lautens) The US Drug Enforcement Administration is pr.....»»
Scientists show that ancient village adapted to drought, rising seas
Around 6,200 BCE, the climate changed. Global temperatures dropped, sea levels rose and the southern Levant, including modern-day Israel, the Palestinian territories, Jordan, Lebanon, southern Syria and the Sinai desert, entered a period of drought......»»
Research reveals overlooked factor driving China"s real estate crisis
The default of Evergrande, one of China's largest developers, set off a chain of defaults among developers, triggering the ongoing property market crisis in China......»»
Big data reveals true climate impact of worldwide air travel
For the first time ever, researchers have harnessed the power of big data to calculate the per-country greenhouse gas emissions from aviation for 197 countries covered by an international treaty on climate change......»»
Discovery of uranium-contaminated soil purification material without secondary environmental pollution
Nuclear energy has long been regarded as a next-generation energy source, and major countries around the world are competing to secure cutting-edge technologies by leveraging the high economic efficiency and sustainability of nuclear power. However,.....»»
FTC fines Razer for every cent made selling bogus “N95 grade” RGB masks
“Deceptive advertising and misinformation posed a risk to public health." Enlarge (credit: Razer) The Federal Trade Commission (FTC) announced this week a proposed settlement [PDF] against Razer that would see the tec.....»»
Cybersixgill Third-Party Intelligence module identifies potential supply chain risks
Cybersixgill, the global cyber threat intelligence data provider, broke new ground by introducing its Third-Party Intelligence module. The new module delivers vendor-specific cybersecurity and threat intelligence to organizations’ security team.....»»