Research pinpoints top five smart factory implementation risks

Smart factory operations can help supply chain leaders achieve many of their highest priorities, but the challenges are too often underestimated. That’s according to research from Gartner, which says successful smart factory initiatives require accompanying cultural and operational transformations that are slow by nature and in many cases will require entirely new organisational designs to […]
The Total Supply Chain Summit is next week – Will you be there?

This is your last chance to claim a complimentary delegate place at the Total Supply Chain Summit – Can you afford not to be there? Your complimentary pass includes; an itinerary of pre-arranged meetings with innovative, budget-saving solution providers, insightful seminars led by industry thought leaders, plus all meals and refreshments. All places also include […]
70% of businesses ramping up investment in supplier risk detection

Moody’s Analytics research into third party risk management shows that the threat to reputations is a key driver of investment in supplier risk detection. Key findings include 69% of businesses say they do not have the necessary visibility over their supply chains to uncover risk in their organisational networks to avoid reputational harm. Meanwhile, 70% of […]
Managing the perennial problem of returns

The challenge of managing returns is not new. Traditionally this service and option has been free for many online shoppers to take advantage of. However, many retailers are planning to charge for returns as they strive to curtail the impact of this problem on their revenue. 25% of the UK’s leading brands are now charging […]
Call for HMRC to reform plastic packaging tax

Less than one in five of forecasted businesses have registered for the Plastic Packaging Tax (PPT) since its launch in April 2022, casting doubts on the effectiveness of the levy and whether it is achieving its environmental goals. That’s according to GoPlasticPallets Managing Director Jim Hardisty, who asserts that the low registration rate and “baffling […]
Do you specialise in Total End-to-End Solutions? We want to here from you!

Each month on Supply Chain Briefing we’ll be shining the spotlight on a different part of the logistics market – and in May we’ll be focussing on Total End-to-End Solutions. It’s all part of our ‘Recommended’ editorial feature, designed to help supply chain industry buyers find the best products and services available today. So, if you’re a […]
Cybersecurity risk a primary buying consideration for Chief Supply Chain Officers

By 2025, 60% of supply chain organisations will use cybersecurity risk as a significant determinant in conducting third-party transactions and business engagements. As the surface area of digital supply chains expand, enhanced cybersecurity is a key theme that Chief Supply Chain Officers (CSCOs) will look to scale this year. “Our survey data has shown an […]
Total Supply Chain Summit: All your needs covered for 2023 and beyond

There’s a complimentary place reserved for you to attend the Total Supply Chain Summit – Can you afford not to claim it? Your complimentary pass includes; an itinerary of pre-arranged meetings with innovative, budget-saving solution providers, insightful seminars led by industry thought leaders, plus all meals and refreshments. All places also include an evening drinks reception and […]
Is carbon management crucial for a clean supply chain win?

As the urgency to combat global warming intensifies, enterprises are increasingly adopting rapid decarbonisation practices to align their business strategies with sustainable development goals (SDGs). With a focus on addressing the dual crises of climate change and the ongoing destruction of natural ecosystems, businesses are at the forefront of sustainability efforts and are highly interested […]
Securing data Value

Perimeter security is flawed on many levels. Not only are businesses in every industry routinely breached but this model provides the same level of security for all data, irrespective of its value. As a result, when hackers are able to access a network, identifying and extracting valuable data can take less than half a day. […]