Please turn on your JavaScript for this page to function normally.
abstract
Week in review: Supply chain security, Android flaw opens users to advanced SMS phishing

Here’s an overview of some of last week’s most interesting news, articles and podcasts: How to reduce the attack surface associated with medical devices As the …

Google
Google’s differential privacy library can now be used by anyone

Google has open-sourced a differential privacy library that helps power some of its core products. What it differential privacy? Differential privacy is a method for analyzing …

patch
September 2019 Patch Tuesday forecast: Microsoft security update will be complete

Microsoft began an aggressive six-month campaign in March of this year to switch the digital signature on all operating system and product updates from using Secure Hash …

laptop
New infosec products of the week: September 6, 2019

Trustwave launches Trustwave Fusion, a new cloud-based cybersecurity platform The Trustwave Fusion platform connects the digital footprints of enterprises and government …

money
Most citizens are against local governments paying ransomware attackers

Nearly 80% of US citizens are increasingly worried about ransomware attacks on cities – yet more than half are still hesitant to have city governments put forth the …

lights
Business demands have outpaced the ability of IT to deliver services

While enterprises have embraced advanced digital technologies, such as IoT/edge computing (77 percent), big data/analytics (83 percent) and digital customer experience (78 …

Market
Global security screening systems market to reach $12.2 billion by 2024

The global security screening systems market was worth $7.9 Billion in 2018, according to ResearchAndMarkets. Security screening refers to any electronic, visual or manual …

Google
Google to pay $170 million for violating children’s privacy on YouTube

Google and its subsidiary YouTube will pay a record $170 million to settle allegations by the Federal Trade Commission (FTC) and the New York Attorney General that the YouTube …

arrow
Supply chain security: Five IT strategies for choosing vendors wisely

With the proliferation of SaaS solutions, API integrations and cloud computing, virtually everything in the modern enterprise is connected to untold number of outside …

connection
Digital transformation success at risk as CIOs struggle to deliver digital projects

Despite rising optimism in digital transformation, the vast majority of organizations are still suffering failure, delays or scaled back expectations from digital …

bug
Critical vulnerabilities uncovered in Danfoss SCADA product, patch now!

Risk Based Security uncovered multiple vulnerabilities in the AK-EM 800 product from SCADA vendor Danfoss. The discovered vulnerabilities Researchers found two critical …

gears
Organizations focus on fine-tuning systems to ensure compliance while reducing risk

66% of financial institutions face the significant challenge of achieving low false positive rates, putting unnecessary burden on their compliance departments and creating …

Don't miss

Cybersecurity news