IronBox specializes in Internet security, data protection and application security. Our team members are recognized security experts that have helped protect some of the industry’s highest value and most targeted data.
Delighting customers with premium data protection, prompt support and easy-to-use software services is our passion.
Barely Half of Organisations Require Suppliers and Partners to Pass Security Audits
Here’s an article from the folks over at Tripwire that report based on a survey that only about 53% of organizations require their suppliers and partners to pass security audits. Based on the organizations I’ve worked with, here are some
How John Brennan’s, CIA Director, Personal Email Got Hacked
Not sure how much of this is accurate, but here’s an article on how the folks who did it was able to pull this off. If you have the option to do so, use 2-factor authentication. –Kevin
Talk Talk Data Breach and Ransom
Talk Talk, a UK telecom, got hacked and received a ransom that put their 4 million customers personal data at risk. Dido Harding, Talk Talk’s Chief Executive Officer, has the right approach: assume that the worst case scenario has happened
What You Need to Know the Next Time You Read Another “Healthcare Security” Article
Just read through this article called “Healthcare orgs fall short on software security” and had a couple thoughts to share. To start, I’ve been in penetration testing, application development security and research for over 15+ years now so I have
Biggest Challenge for Healthcare: Security and Privacy
Wow, it’s great to see the problem of healthcare security and privacy get some of the spotlight (check out this article). Some of the key points from the article: Criminals are targeting healthcare, because healthcare records can fetch up to
Cybersecurity Tips for Business Travelers
If you’re on the road, here are some good cybersecurity tips to follow for travelers. I’d also add to sign up for a VPN service (ping us if you’d like some recommendations), it’ll help protect your network traffic when connected
Android Song Hack
Never mind the fact that the video shows an iPhone in all the video footage, but a security bug in the Android mobile phone code can allow the phone to get hacked by just listening to a specially crafted malicious
T-Mobile Hack: 15M Records
Looks like the bad guys are back at it, here’s an article that reports that T-Mobile suffered a data breach losing about 15M records. Records from September 2013-2016 are believe to be compromised. –Kevin
Hackers Stole 5.6M Finger Prints, Now What?
The Office of Personal Management (OPM) indicated that about 5.6 million finger prints were stolen from them during a data breach in the summer. OPM has indicated that the ability to use that finger print data right now is limited,