1(630)802-8605 Ravi.das@bn-inc.net

Other Security News

Read On to See What Things Are Happening in the World of Security

Security Magazine

Check out the latest posts from Security Magazine here!

  • New Bill Would Create White House Critical Technologies Office
    on March 6, 2019 at 5:00 am

    A bipartisan bill has been introduced that would create an Office of Critical Technologies & Security in the White House, which would be charged with "coordinating across agencies and developing a long-term, whole-of-government strategy to protect against IP theft and risks to critical supply chains." […]

  • Ready to ‘Self-Heal’ Your Enterprise?
    by ritcheyd@bnpmedia.com (Diane Ritchey) on March 1, 2019 at 5:00 am

    Often when we think “self-healing,” we think of nature – or cells, more specifically. […]

  • Mobile and IoT Devices: Enabling Remote Access
    on February 21, 2019 at 5:00 am

    As many industries adopt IoT solutions for increased security, reduced costs and new opportunities, the buildings industry is looking to do the same by incorporating IoT and mobile functionality into a range of facilities, including around building security systems. […]

  • Eliminates the Need for IR LEDs
    on February 14, 2019 at 5:00 am

    These Ultra Intensifier Cameras from Speco Technologies eliminate the need for infrared LED lighting by taking the light available and amplifying it to provide color images in day and night. […]

  • Designed for Easy Installation
    on February 14, 2019 at 5:00 am

    With a scan and set-up QR code, the VERA Thermal camera from 3xLOGIC enables integrators to set up cameras faster and more effectively, saving enterprises money on installation cost. […]

  • Addresses Challenging Lighting Indoors and Out
    on February 14, 2019 at 5:00 am

    Designed to support challenging lighting conditions typical in city surveillance, airports, traffic, gaming facilities, corrections, hospitality and more, the GFC Professional 4K camera from Pelco by Schneider Electric delivers 8MP resolution detail for demanding surveillance applications with heavy foot and vehicular traffic. […]

Cyber Security Case Studies

Read up on the Cyber case studies from Security Magazine here!

  • When Physical Intrusions Lead to Digital Breaches
    by edfinkel@earthlink.net (Ed Finkel) on April 4, 2019 at 4:00 am

    Healthcare institutions lock down access through proper ID management and employee training. […]

  • How Unified Device Management Is Critical to BYOD Enterprises
    on November 1, 2014 at 4:00 am

     Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway. &nbs […]

  • Security Implications of the Electric Smart Grid
    on September 4, 2014 at 5:00 am

    As critical infrastructure in the United States becomes more dependent on networked systems, such as the smart grid, the electricity industry is at risk for new avenues of attack.&nbs […]

  • Defense in Depth: A Layered Approach to Network Security
    on September 1, 2014 at 4:00 am

    Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems. […]

  • Automating Security Incident Respons
    by ritcheyd@bnpmedia.com (Diane Ritchey) on September 1, 2014 at 4:00 am

    It allows them to coordinate all aspects of a response: what's going on in the network, what information is available from threat intelligence feeds, what the regulations are, what the best practices are, and how to ensure that everything is getting done quickly and effectively. […]

Krebs on Security News

Read the latest security news from Krebs on Security

  • Wipro Intruders Targeted Other Major IT Firms
    by BrianKrebs on April 18, 2019 at 5:42 pm

    The criminals responsible for launching phishing campaigns that netted dozens of employees and more than 100 computer systems last month at Wipro, India's third-largest IT outsourcing firm, also appear to have targeted a number of other competing providers, including Infosys and Cognizant -- two other large technology consulting companies, new evidence suggests. […]

  • How Not to Acknowledge a Data Breach
    by BrianKrebs on April 17, 2019 at 5:56 pm

    I'm not a huge fan of stories about stories, or those that explore the ins and outs of reporting a breach. But occasionally it seems necessary to publish such accounts when companies respond to a breach report in such a way that it's crystal clear that they wouldn't know what to do with a breach if it bit them in the nose, let alone festered unmolested in some dark corner of their operations. […]

  • Experts: Breach at IT Outsourcing Giant Wipro
    by BrianKrebs on April 15, 2019 at 9:19 pm

    Indian information technology (IT) outsourcing and consulting giant Wipro [NYSE:WIT] is investigating reports from multiple security experts that Wipro's systems have been hacked and are being used to launch attacks against the company's customers, multiple sources tell KrebsOnSecurity. The company has refused to respond to questions about the alleged incident. […]

  • ‘Land Lordz’ Service Powers Airbnb Scams
    by BrianKrebs on April 14, 2019 at 6:40 pm

    Scammers who make a living swindling Airbnb.com customers have a powerful new tool at their disposal: A software-as-a-service offering called "Land Lordz," which helps automate the creation and management of fake Airbnb Web sites and the sending of messages to advertise the fraudulent listings. […]

  • Android 7.0+ Phones Can Now Double as Google Security Keys
    by BrianKrebs on April 11, 2019 at 4:14 pm

    Google this week made it easier for Android users to enable strong 2-factor authentication (2FA) when logging into Google's various services. The company announced that all phones running Android 7.0 and higher can now be used as Security Keys, an additional authentication layer that helps thwart phishing sites and password theft. […]