1(630)802-8605 Ravi.das@bn-inc.net

Other Security News

Read On to See What Things Are Happening in the World of Security

Security Magazine

Check out the latest posts from Security Magazine here!

  • Turns Video Analytics into Powerful Intelligence
    on August 19, 2019 at 4:00 am

    Arcules Video Surveillance-as-a-Service (VSaaS) and Access Control-as-a-Service (ACaaS) allow organizations to transform video into powerful intelligence for increased business insight and security.

  • Fostering Accountability Through Weapons Equipment Management
    on August 13, 2019 at 7:00 pm

    When it comes to managing sensitive equipment as a public safety officer, your firearms are some of the most high-risk assets you can leave improperly secured. While there’s been a lot of conversation in the media about how to use firearms responsibly, there are several best practices you can utilize to help ensure that they are only accessible to authorized personnel who are fully accountable for their use.&nbs

  • Multi-Sensor Cameras Save Money for Installers and Customers
    on August 13, 2019 at 7:00 pm

    While the concept of the multi-sensor or multi-directional camera is not new, there have been noteworthy advancements that make these cameras the best choice for many types of security installations.  In the past, many multi-sensor cameras were not able to deliver high frames per second / per sensor (fps) for smooth, clear motion capture and frequently represented a compromise in performance.

  • How a GuideWell Security Team Member Saved a Life
    by ritcheyd@bnpmedia.com (Diane Ritchey) on August 1, 2019 at 4:00 am

    One of the most satisfying parts of my role as Editor in Chief of Security magazine is the opportunity to share stories with you.

  • Pharmaceutical Industry taking a Quantum Leap with RFID Technology
    on July 22, 2019 at 1:20 pm

    With the rise of the fourth industrial revolution—Industry 4.0—technology has become an inextricable aspect of business operations in most sectors. RFID (Radio Frequency Identification) has become ubiquitous across a wide range of industries.

  • Fingerprint Drug Test Technology Developed
    on July 5, 2019 at 4:00 am

    Harrow Council in the UK has successfully trialied a drug-test technology that uses fingerprints alone.

Cyber Security Case Studies

Read up on the Cyber case studies from Security Magazine here!

  • Safeguarding Security and Loss Prevention at Gap Inc.
    on July 3, 2019 at 4:00 am

    How does Keith White, EVP of Loss Prevention at Gap, Inc., manage security across a vast enterprise?

  • When Physical Intrusions Lead to Digital Breaches
    by edfinkel@earthlink.net (Ed Finkel) on April 4, 2019 at 4:00 am

    Healthcare institutions lock down access through proper ID management and employee training.

  • How Unified Device Management Is Critical to BYOD Enterprises
    on November 1, 2014 at 4:00 am

     Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway. &nbs

  • Security Implications of the Electric Smart Grid
    on September 4, 2014 at 5:00 am

    As critical infrastructure in the United States becomes more dependent on networked systems, such as the smart grid, the electricity industry is at risk for new avenues of attack.&nbs

  • Defense in Depth: A Layered Approach to Network Security
    on September 1, 2014 at 4:00 am

    Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems.

Krebs on Security News

Read the latest security news from Krebs on Security

  • Breach at Hy-Vee Supermarket Chain Tied to Sale of 5M+ Stolen Credit, Debit Cards
    by BrianKrebs on August 22, 2019 at 9:38 pm

    On Tuesday of this week, one of the more popular underground stores peddling credit and debit card data stolen from hacked merchants announced a blockbuster new sale: More than 5.3 million new accounts belonging to cardholders from 35 U.S. states. Multiple sources now tell KrebsOnSecurity that the card data came from compromised gas pumps, coffee shops and restaurants operated by Hy-Vee, an Iowa-based company that operates a chain of more than 245 supermarkets throughout the Midwestern United States.

  • Forced Password Reset? Check Your Assumptions
    by BrianKrebs on August 21, 2019 at 11:58 am

    Almost weekly now I hear from an indignant reader who suspects a data breach at a Web site they frequent that has just asked the reader to reset their password. Further investigation almost invariably reveals that the password reset demand was not the result of a breach but rather the site's efforts to identify customers who are reusing passwords from other sites that have already been hacked. But ironically, many companies taking these proactive steps soon discover that their explanation as to why they're doing it can get misinterpreted as more evidence of lax security. This post attempts to unravel what's going on here.

  • The Rise of “Bulletproof” Residential Networks
    by BrianKrebs on August 19, 2019 at 1:03 pm

    Cybercrooks increasingly are anonymizing their malicious traffic by routing it through residential broadband and wireless data connections. Most often, those connections are hacked computers, mobile phones, or home routers. But this is the story of a sprawling "bulletproof residential VPN" service that appears to have been built by acquiring chunks of Internet addresses from some the largest ISPs and mobile data providers in the United States and abroad.

  • Meet Bluetana, the Scourge of Pump Skimmers
    by BrianKrebs on August 14, 2019 at 12:25 pm

    "Bluetana," a new mobile app that looks for Bluetooth-based payment card skimmers hidden inside gas pumps, is helping police and state employees more rapidly and accurately locate compromised fuel stations across the nation, a study released this week suggests. Data collected in the course of the investigation also reveals some fascinating details that may help explain why these pump skimmers are so lucrative and ubiquitous.

  • Patch Tuesday, August 2019 Edition
    by BrianKrebs on August 13, 2019 at 9:57 pm

    Most Microsoft Windows (ab)users probably welcome the monthly ritual of applying security updates about as much as they look forward to going to the dentist: It always seems like you were there just yesterday, and you never quite know how it's all going to turn out. Fortunately, this month's patch batch from Redmond is mercifully light, at least compared to last month.