1(630)802-8605 Ravi.das@bn-inc.net

The Latest Information on SecurityBriefing.net™

HOW TO AVOID THE NEXT BIG SECURITY BREACH – 8 TOP TIPS

HOW TO AVOID THE NEXT BIG SECURITY BREACH – 8 TOP TIPS

It's the basics that let you down. Most of the big breaches you hear about today are not due to some hacking wizardry you see in the movies. Most are due to companies not taking care of the basics; patching, passwords, filtering, and the like. Some companies spend...

read more
What Pen Tests Reveal: The Top 3 Findings

What Pen Tests Reveal: The Top 3 Findings

The hacking industry is alive and well in 2018, and it’s funny how the majority of attack vectors haven’t changed in the past five years. I thought it would be interesting to share information gathered from expert pen testers regarding the top three vulnerabilities...

read more
How To Avoid a Phishing Attack – 5 Top Tips

How To Avoid a Phishing Attack – 5 Top Tips

Phishing attacks account for about half of all cybercrime, making them by far the biggest threat to your company’s cybersecurity. A well delivered phishing email can be devasting for a company. I should know; in my experience in the intelligence world, phishing...

read more
IoT Security – An Overlooked Factor

IoT Security – An Overlooked Factor

Everyone loves IoT devices for their smartness, convenience and utility. However, there are a range of questions around security and privacy that need solutions. Are you sure about how secure are they? Do they offer privacy for the data they collect from us? Are they...

read more
Don’t Play Roulette With Your Web App

Don’t Play Roulette With Your Web App

Yesterday I spoke to a gentleman responsible for all things IT in his organization. During the conversation, he referred to a critical web application the organization deploys (and which handles sensitive data) but for which they had not hired a third party to conduct...

read more
GDPR – One Year Review – Achievements and Challenges

GDPR – One Year Review – Achievements and Challenges

25th May 2019 saw the 1st anniversary of GDPR in place. Without doubt, GDPR is one legislation that turned the privacy concerns on its head and made businesses take privacy seriously. GDPR is one revolutionary legislation which puts control of personal information in...

read more
Pathways to Working in Cyber Security

Pathways to Working in Cyber Security

We live in a digital age. The swipe of a finger, the click of a mouse, or the activation of a voice-controlled device. The luxury of modern conveniences are a force to be reckoned with. Individuals who are not in the Information Technology field may not know the level...

read more

The Tech Gender Gap: How to Break the Cycle.

20 Percent. That is the national employment average for women who work in the Information Technology sector, yet women make up over half of the workforce in the United States. The percentage is even lower for women who work in cybersecurity. Technology is advancing...

read more

How to keep your computer safe

With the penetration of more and more computers and smart devices in our lives, the chances of sabotage, phishing, instances of information getting stolen, and devices getting infected has been increasing exponentially. The attack is not limited to computers but also...

read more