With the ever-evolving threat landscape, increased concern regarding cybersecurity, and the convergence of IT operations and security, many believe that cybersecurity programs must take an all-inclusive approach in addressing security incidents and data breaches. Traditional incident response models primarily offer technical guidance; they are not designed to help organizations gain […]

Going Beyond Incident Response

Brilliance Security Magazine is a Media Partner with the ASIS Global Security Exchange, now called GSX, this year and we can feel the excitement building as the show gets ready to kick off at the Las Vegas Convention Center Sept 23-27.  If you haven’t already registered for this conference, you’ll […]

More than just a name change – GSX debuts their ...

Deception is a breach detection tactic that utilizes decoys and misinformation to divert and delay an adversary.  As part of your overall cybersecurity strategy, this tactic gives the SOC / IR teams sufficient time to perform remediation before an adversary can complete their mission.  Deception is not generally used to […]

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker ...

Employee mobility, BYOD, virtualization, and cloud services have all combined together to present organizations with a large and fluid environment for which they must identify and manage the vulnerabilities of every asset on the network.  A vulnerability scanner can help with this task by assessing computers, systems, and apps for […]

How do you manage vulnerabilities for your ever-changing IT attack ...

Guest Contributor: Nina Pineda, Consultant, Pod Group The internet of things is on the rise, helping organizations digitally transform their businesses and propel them into the future; its integration across labor-intensive industries is evolving their operations and strategies. It is also changing human behavior as we know it as IoT […]

Strengthen Your Internet of Things Security: Here’s How

The Canadian Broadcasting Corporation (CBC) reported today that Air Canada admits the personal information for about 20,000 customers “may potentially have been improperly accessed” via a breach in its mobile app, so the company has locked down all 1.7 million accounts as a precaution until customers change their passwords. A banner […]

Air Canada Says 20,000 Mobile App Users Hit by Data ...

It is being widely reported today that 500 million client information records were leaked from Hauzhu Hotels Group.  The information includes 123 million registration data records, such as name, mobile number, ID number and log-in pin; 130 million check-in records, such as name, ID number, home address and birthday; and […]

PII for 130 Million Hotel Guests For Sale on the ...

The frequency and urgency of conversations about Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Operational Technology (OT) network security are definitely on the rise. Everywhere you look there are articles, presentations, webinars, and claims of new and better solutions crowding this previously uncrowded space. To help […]

The Simplest and Most Comprehensive Way to Address ICS Risk

Editor’s note: The following was originally posted on Schneider Electric’s blog.  With their permission, and because this is an important topic, we decided to republish it here for our readers.  We applaud Schneider Electric for their willingness to address this attack against one of their customers head-on, without flinching, and […]

One Year After Triton: Building Ongoing, Industry-Wide Cyber Resilience

Guest Contributor: Kim Crawley I’ve been playing quite a bit of Assassin’s Creed Syndicate. Yes, I know the game came out in 2015. But in the past several years, I’ve played Assassin’s Creed II, Assassin’s Creed Brotherhood, Assassin’s Creed Revelations, Assassin’s Creed III, Assassin’s Creed Liberation, and Assassin’s Creed Rogue. […]

These Web Browsers Will Help You Surf the Web Stealthily

For some organizations, the ability to communicate privately is an absolute must, even a life or death situation. For these entities, which consist mostly of government agencies, law firms, and Fortune 100 companies, critical information getting into the wrong hands can be disastrous. To give you, our readers, a glimpse […]

Allowing really important people who need to talk about really ...

Guest Contributor: Aravind P R E, Product Consultant, ManageEngine A common question posed by enterprises when it comes to defending against cyberthreats is “Which operating system is most secure?” There are only a few major operating systems (OSs) available, so enterprises aren’t left with many choices. Out of the big […]

Linux Security and Patching: Are You As Safe As You ...

Black Hat 2018 was a huge success by whatever measure you choose.  Attendance was way up over our last visit to this conference.  The excitement in the air was palpable.  The keynote speakers were iconic.  Brilliance Security Magazine set out to interview as many industry experts and innovators as possible.  […]

Black Hat 2018 was a Huge Success – See What ...

So, you think your cybersecurity acuity is up to snuff?  Well, check out these top ten cybersecurity myths from Varonis to see what you might believe that just ain’t so.  You may be surprised!

Top 10 Cybersecurity Myths

Today’s endpoint positive security goes far beyond the whitelisting of yesteryear.  Sometimes called OS-Centric Positive Security, current positive security models focus on the damage stage of the attack.  While attack strategies are ever changing and are nearly unlimited, the intentions of the attacker in the damage stage remains fairly static […]

What if we become a bit more positive in the ...

The global leader of identification solutions is now an HID FARGO Connect Partner MIAMI, Florida – Plasco ID, the world’s largest integrator of identification solutions, announced it has been chosen as a trusted provider of HID® FARGO® Connect™, the cloud-based card personalization and issuance solution by HID Global that untethers […]

Plasco ID Joins HID Partner Program as a Provider for ...

Features “above the horizon” viewing for greater coverage with easier mounting FRESNO, Calif. (Sept. 11, 2018) – Pelco™ by Schneider Electric, a global leader in intelligent video surveillance solutions, has released the Spectra Professional IR – a rugged camera ideal for transportation, city surveillance, airports, seaports, and commercial markets. The […]

Pelco Introduces the Rugged Spectra Professional IR PTZ Camera

Allentown, Pa., Sept. 11, 2018 — Vistacom Inc., a leading provider of audiovisual and communications solutions, announced today the availability of the enhanced version of its Vistacom SecureView™ video wall solution. Vistacom SecureView 2.0 is an intelligent visual solution that enables organizations to view data from multiple services and solutions in a single […]

Vistacom Enhances Video Wall Solution to Ensure Intelligent Security Operations