
Week in review: Supply chain security, Android flaw opens users to advanced SMS phishing
Here’s an overview of some of last week’s most interesting news, articles and podcasts: How to reduce the attack surface associated with medical devices As the …

Google’s differential privacy library can now be used by anyone
Google has open-sourced a differential privacy library that helps power some of its core products. What it differential privacy? Differential privacy is a method for analyzing …

September 2019 Patch Tuesday forecast: Microsoft security update will be complete
Microsoft began an aggressive six-month campaign in March of this year to switch the digital signature on all operating system and product updates from using Secure Hash …

New infosec products of the week: September 6, 2019
Trustwave launches Trustwave Fusion, a new cloud-based cybersecurity platform The Trustwave Fusion platform connects the digital footprints of enterprises and government …

Most citizens are against local governments paying ransomware attackers
Nearly 80% of US citizens are increasingly worried about ransomware attacks on cities – yet more than half are still hesitant to have city governments put forth the …

Business demands have outpaced the ability of IT to deliver services
While enterprises have embraced advanced digital technologies, such as IoT/edge computing (77 percent), big data/analytics (83 percent) and digital customer experience (78 …

Global security screening systems market to reach $12.2 billion by 2024
The global security screening systems market was worth $7.9 Billion in 2018, according to ResearchAndMarkets. Security screening refers to any electronic, visual or manual …

Google to pay $170 million for violating children’s privacy on YouTube
Google and its subsidiary YouTube will pay a record $170 million to settle allegations by the Federal Trade Commission (FTC) and the New York Attorney General that the YouTube …

Supply chain security: Five IT strategies for choosing vendors wisely
With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside …

Digital transformation success at risk as CIOs struggle to deliver digital projects
Despite rising optimism in digital transformation, the vast majority of organizations are still suffering failure, delays or scaled back expectations from digital …

Critical vulnerabilities uncovered in Danfoss SCADA product, patch now!
Risk Based Security uncovered multiple vulnerabilities in the AK-EM 800 product from SCADA vendor Danfoss. The discovered vulnerabilities Researchers found two critical …

Organizations focus on fine-tuning systems to ensure compliance while reducing risk
66% of financial institutions face the significant challenge of achieving low false positive rates, putting unnecessary burden on their compliance departments and creating …
Featured news
Resources
Don't miss
- Quantifying cyber risk strategies to resonate with CFOs and boards
- Top 5 threats keeping CISOs up at night in 2025
- CISOs, are your medical devices secure? Attackers are watching closely
- Cybersecurity classics: 10 books that shaped the industry
- NIST selects HQC as backup algorithm for post-quantum encryption