Do-Not-Call Registry StaysThe national do-not-call registry passes constitutioinal muster, as the Supreme Court rejected an appeal by telemarketers on First Amendment grounds. The registry, often lauded by privacy advocates, includes more than 64 million telephone numbers, according to the Federal Trade Commission. A story in the Washington Post telemarketers face a fine of up to $11.000 for every number that they call on the list. The ruling upheld a Denver appeals court that unanimously ruled that the do-not-call list was a valid restraint because it “targets speech that invades the privacy of the home, a personal sanctuary that enjoys unique status in our constitutional jurisprudence.”For more details, read the full article in the Washington Post.Software Failures Only Part of the Problem Don’t blame the software for major breakdowns, at least all the time. An Associated Press story quotes experts who say that in most cases software projects fail because of poor implementation, not bad code. According to the report, the National Institute of Standards and Technology found that software bugs cost the U.S. economy about $59.5 billion annually. The same study showed that about $22.2 billion of that cost could have been saved through better testing. In one case cited in the story, inadequate testing led to a shutdown of a system that controls communication between air traffic controllers and pilots in Southern California.For more details, read the full Associated Press article in the Los Angeles Times. Study Shows Lax Privacy Protection at Transportation, Logistics FirmsCustomer privacy isn’t being protected as it should at many of the largest transportation and logistics firms. According to a recent survey by The Customer Respect Group released Monday, more than one-third of the largest transportation and logistics companies shared customers’ personal data to third parties without their permission. Furthermore, reports Computerworld (a sister company to CXO Media), one-fifth of the companies surveyed didn’t have privacy policies. For more details, read the full article in Computerworld. Related content feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management news Intel Trust Authority attestation services now in general availability Formerly known as Project Amber, Intel’s attestation services support confidential computing deployments. By Michael Nadeau Sep 20, 2023 3 mins Zero Trust Security Hardware Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe