Operations | Monitoring | ITSM | DevOps | Cloud

Tech in the Forest: Driving Transparency in Wood Supply Chains

Wood supply chains are moving into a digital age. New tools help people see exactly where logs come from and where they go. The shift makes the entire process more open for everyone. Seeing every step of the journey builds trust. It keeps businesses honest and helps forests stay healthy for the long term. Changes are making a big impact on how we think about wood.

AI Supply Chain Attacks Are Here. And Most Organizations Aren't Ready

When I read about the Vercel breach tied to a Context AI compromise, I wasn’t surprised. I’ve been talking with customers for a while now about how AI was going to introduce a new kind of supply chain risk. This is exactly what that looks like. What stands out to me is how familiar the pattern is. We saw it with open source, then again with SaaS, and again with cloud.

The 2026 software supply chain security gap

AI-generated code is now nearly universal. Enforcement is not. That gap is where your software supply chain is most exposed. Cloudsmith's CEO Glenn Weinstein, Co-Founder & CTO Lee Skillen, and VP of Product Alison Sickelka join Product Marketing Manager Meghan McGowan to unpack the 2026 State of Artifact Management report – a survey-based look at how AI development is reshaping the threat landscape, what organizations are getting wrong, and what the highest-leverage fix actually looks like.

Cloudsmith raises $72M Series C to secure the AI software supply chain

Cloudsmith raised $72 million in Series C funding, led by TCV and Insight Partners, to build the operating system for the modern software supply chain. AI agents are writing code faster than teams can secure it. That shifts the risk calculus because more software, built faster, means more attack surface. Artifact management is the control point between every software producer and consumer, and it's where Cloudsmith sits.

What is Vendor Due Diligence in Operations Management?

Vendor due diligence is the aggressive, systematic interrogation of a third-party supplier's financial, legal, and operational reality before a contract is signed. It prevents catastrophic supply chain failures. Procurement prioritizes unit cost. Operations demands continuity. Trusting a vendor's glossy sales pitch is a fast track to factory floor paralysis.

How Uninterruptible Power Tech is Shielding Automated Supply Chains from Grid Failures

Modern supply chains are unrecognisable from those of just a decade ago. Today, vast warehouses operate with precision choreography, relying heavily on autonomous robotics, advanced sensor networks, and real-time edge computing. However, this hyper-efficiency has a distinct and growing vulnerability. As operations become entirely dependent on continuous electricity, any disruption to the power supply can bring a highly automated logistics hub to a grinding halt.

npm axios attack - What happened and how to protect your supply chain

100M+ weekly downloads. One compromised maintainer account. A remote access trojan in two active release branches. This is a 30-minute breakdown of the Axios npm supply chain attack – how it happened, why it was hard to detect, and what any engineering team can do right now to reduce exposure. Nigel Douglas, Head of Developer Relations at Cloudsmith, is joined by Jenn Gile, co-founder of Open Source Malware, a community-driven threat intelligence platform focused on malicious open source packages.

Emerging Cyber Threats Every Organization Should Know

Cyber threats in 2026 are evolving faster than most organizations can comfortably manage. Attackers are using automation, artificial intelligence, and scalable attack models to target businesses of every size. What used to be handled in isolation by IT teams is now a boardroom concern. A single breach can disrupt operations, damage trust, and create long-term financial consequences. Leaders are starting to recognize that cybersecurity is not just about tools but about strategy, governance, and accountability across the organization.

Hot code burns: the supply chain case for letting your containers cool before you ship

In September 2025, dozens of popular JavaScript packages, like chalk and debug, were compromised on the npm registry. These packages are so ubiquitous they end up in everything: front-end apps, back-end microservices, and CI tooling. Developers didn’t do anything wrong, they just ran the same command they always do: npm install chalk. But then the malware arrived silently. This wasn’t a bug in an operating system. It wasn’t a virus on someone’s laptop.