1(630)802-8605 Ravi.das@bn-inc.net

Other Security News

Read On to See What Things Are Happening in the World of Security

Security Magazine

Check out the latest posts from Security Magazine here!

Cyber Security Case Studies

Read up on the Cyber case studies from Security Magazine here!

  • Safeguarding Security and Loss Prevention at Gap Inc.
    on July 3, 2019 at 4:00 am

    How does Keith White, EVP of Loss Prevention at Gap, Inc., manage security across a vast enterprise?

  • When Physical Intrusions Lead to Digital Breaches
    by edfinkel@earthlink.net (Ed Finkel) on April 4, 2019 at 4:00 am

    Healthcare institutions lock down access through proper ID management and employee training.

  • How Unified Device Management Is Critical to BYOD Enterprises
    on November 1, 2014 at 4:00 am

     Eight months: That’s the average amount of time most IT security breaches go unnoticed. Security enterprises need to establish not only ways to protect themselves from these breaches but ways to uncover them in real-time, before they become major business disruptions. And as Bring Your Own Device (BYOD) and mobility continue to transform the way we do business, many security managers and IT executives are finding that if they don’t initiate a robust security policy, employees are likely to use personal laptops and mobile devices to conduct business anyway.  

  • Security Implications of the Electric Smart Grid
    on September 4, 2014 at 5:00 am

    As critical infrastructure in the United States becomes more dependent on networked systems, such as the smart grid, the electricity industry is at risk for new avenues of attack. 

  • Defense in Depth: A Layered Approach to Network Security
    on September 1, 2014 at 4:00 am

    Network and security components must be able to communicate so that if an attacker penetrates one system, others can respond immediately to take preventative measures. IF-MAP is a robust protocol that enables information sharing between disparate systems.

Krebs on Security News

Read the latest security news from Krebs on Security

  • The Great $50M African IP Address Heist
    by BrianKrebs on December 11, 2019 at 10:31 pm

    A top executive at the nonprofit entity responsible for doling out chunks of Internet addresses to businesses and other organizations in Africa has resigned his post following accusations that he secretly operated several companies which sold tens of millions of dollars worth of the increasingly scarce resource to online marketers. The allegations stemmed from a three-year investigation by a U.S.-based researcher whose findings shed light on a murky area of Internet governance that is all too often exploited by spammers and scammers alike.

  • Patch Tuesday, December 2019 Edition
    by BrianKrebs on December 11, 2019 at 1:51 am

    Microsoft today released updates to plug three dozen security holes in its Windows operating system and other software. The patches include fixes for seven critical bugs — those that can be exploited by malware or miscreants to take control over a Windows system with no help from users -- as well as another flaw in most versions of Windows that is already being exploited in active attacks.

  • CISO MAG Honors KrebsOnSecurity
    by BrianKrebs on December 10, 2019 at 4:46 pm

    CISO Magazine, a publication dedicated to covering issues near and dear to corporate chief information security officers everywhere, has graciously awarded this author the designation of "Cybersecurity Person of the Year" in its December 2019 issue.

  • Ransomware at Colorado IT Provider Affects 100+ Dental Offices
    by BrianKrebs on December 7, 2019 at 9:17 pm

    A Colorado company that specializes in providing IT services to dental offices suffered a ransomware attack this week that is disrupting operations for more than 100 dentistry practices, KrebsOnSecurity has learned. Multiple sources affected say their IT provider, Englewood, Colo. based Complete Technology Solutions (CTS), was hacked, allowing a potent strain of ransomware known as "Sodinokibi" or "rEvil" to be installed on computers at more than 100 dentistry businesses that rely on the company for a range of services -- including network security, data backup and voice-over-IP phone service.

  • Apple Explains Mysterious iPhone 11 Location Requests
    by BrianKrebs on December 5, 2019 at 7:46 pm

    KrebsOnSecurity ran a story this week that puzzled over Apple's response to inquiries about a potential privacy leak in its new iPhone 11 line, in which the devices appear to intermittently seek the user's location even when all applications and system services are individually set never to request this data. Today, Apple disclosed that this behavior is tied to the inclusion of a new short-range technology that lets iPhone 11 users share files locally with other nearby phones that support this feature, and that a future version of its mobile operating system will allow users to disable it.