Media Database
>
Scott Koegler

Scott Koegler

Executive Editor at Successful Business News

Contact this person
Email address
s*****@*******.netGet email address
Phone
(XXX) XXX-XXXX Get mobile number
Location
United States
Covering topics
  • Non-Profits
  • Computers & Technology
  • Technology
  • Beer
  • Cloud Computing
Languages
  • English
Influence score
31
Media Database
>
Scott Koegler
searcherp.techtarget.com

What you need to know about fourth-party logistics

While many are familiar with third-party logistics, fourth-party logistics remains shrouded in mystery. Learn what 4PL is, how it builds on the concept of 3PL and why it’s becoming more popular.
searcherp.techtarget.com

What are the roles of 3PL and 4PL in supply chain management?

Many organizations use third-party logistics providers for warehousing and delivery services, but to keep up with today’s demand, they may want to consider adding 4PLs. Find out how the combination of 3PL and 4PL in supply chain management can benefit your company.
searcherp.techtarget.com

Can low-code development benefit supply chain management?

Low-code development can enable supply chain professionals -- who understand their issues most intimately -- to develop apps that help keep operations, logistics and other areas running smoothly.
searcherp.techtarget.com

Why do EDI standards dominate for electronic transactions?

Despite many believing that EDI standards are outdated, their use by major retailers and other factors keeps them in play. Here’s what you need to know.
searcherp.techtarget.com

Which supply chain visibility tools help improve logistics?

Today, six technologies -- new and older -- are functioning together to create more effective supply chain visibility tools. Here’s a look.
securityintelligence.com

Increasing Security Preparedness and Awareness Among Board Members

To increase security preparedness and awareness among executives, CISOs need to communicate cyber risks in business terms and regularly assess their systems for vulnerabilities.
searcherp.techtarget.com

What is the difference between 3PL and 4PL?

Just what are the differences between 3PL and 4PL services? The terms can be confusing. Here’s a look at how they differ.

Contact Scott Koegler and 1 million other journalists

Search by beat, location, outlet & position to find the right journalists for your story.

Sign up for free
securityintelligence.com

New Collar Careers Bring Military Veterans to the Security Battlefield

Military veterans are prime candidates for new collar careers in cybersecurity because leadership and incident response are built into their training.
securityintelligence.com

An Incident Response Plan Can Help You Predict Your Security Future

An incident response plan and thorough analysis of historical threat data can help security teams predict how fraudsters might breach their networks.
securityintelligence.com

The Security Leader’s Expanding Role: Seven Keys to CISO Success

Today’s CISO needs to be more than just a security leader. The role now demands constant communication, continuous education and acute business sense.
securityintelligence.com

The Five Most Critical Tasks in the CISO Job Description

Critical elements of the CISO job description are often overlooked, exposing enterprise data and individual employees to cyberthreats.
securityintelligence.com

How Hotel Cybersecurity Keeps Guests and Data Secure

Hotel cybersecurity is not just about protecting financial data — it extends to guests’ physical and digital property, vulnerable endpoints and more.
securityintelligence.com

Execute Your IoT Deployment by the Book

More connected devices means a larger threat surface. That’s why it’s critical to prioritize security when designing your IoT deployment.
securityintelligence.com

Cybercrime Has Become a Commodity

Cybercrime tools available through private networks and on the Dark Web make it easier than ever for would-be fraudsters to infiltrate networks.
securityintelligence.com

The IoT Is BYOD All Over Again

Like the rise of BYOD culture in the enterprise, the explosion of IoT devices generates a new set of challenges for security professionals.
securityintelligence.com

Shadow IT Comes of Age

Harnessing shadow IT starts with security leaders. IT and security teams must work together to identify problem areas and provide quality solutions.
securityintelligence.com

CSOs Who Understand the User Experience Deliver Better Security

A smooth user experience leads to more secure systems and databases. CSOs should consult users directly to resolve issues related to the data they access.
securityintelligence.com

Learn to Love Online Dating Security

IT leaders must educate employees about online dating security to minimize the risks associated with the use of these services in the workplace.
searchapparchitecture.techtarget.com

APIs go unnoticed as an alternative to EDI services

Learn about the advantages APIs can provide over EDI services and why businesses still aren’t leveraging them enough.