Convergence can be thought of as the integration of knowledge, tools, and activities for a common goal.  There is a tendency that, as technology changes, new systems evolve with enhanced capabilities allowing them to integrate data from more and more sources.  This tendency creates an opportunity for the emergence […]

Converged Security & Information Management

The cybersecurity skills shortage has many organizations scrambling to find more talent and to find ways to make their analysts more productive.  In an effort to provide some insight into one possible solution to help alleviate this problem, we spoke with Caitlin Huey, senior threat analyst for EclecticIQ Fusion Center. […]

How You Can Increase the Productivity of Security Analysts

Growing Gaps in Protections Against Short-Lived, Yet Dangerous Phishing Threats on the Web SlashNext, the leader in real-time phishing site detection for businesses, released new survey data suggesting a dangerous lack of understanding and gaps in protection against modern, fast-moving phishing attacks. A revealing survey of cybersecurity decision-makers showed that […]

SlashNext Survey Reveals 95% of IT Security Pros Underestimate Phishing ...

California’s “CCPA” Has a Potentially Huge Footprint. On June 28, 2018, The State of California passed into law a controversial landmark measure affecting not only the state of California but companies around the globe who have customers in that state. The California Consumer Privacy Act (CCPA) was drawn in direct […]

CCPA: The Importance of Understanding and Complying With the New, ...

  Brilliance Security Magazine sat down with Jim Viscardi, Vice President of the Global Security Division for Metrasens at the GSX Conference in Las Vegas. We asked Jim to tell us what’s new at Metrasens and what they have been up to lately.  He told us about how they have spent […]

Adding a Layer of Physical Security by Pushing Your Perimeter ...

Cryptojacking is on the rise and is a particularly nefarious threat because it is hard to detect.  Once your system has been cryptojacked, malicious cryptocurrency mining software runs silently in the background, robbing you of your precious computing power and often staying just under the threshold of easy detection. We […]

The Rising Trend of Cryptojacking

The International Security Conference & Exposition – also known as ISC East – is the Northeast’s largest security trade show.  7,000 security and public safety professionals convene in New York November 14 – 15, 2018 to meet experts from over 250 leading security brands.  The combination of one-on-one conversations with […]

ISC East 2018 is Nearly Upon Us

TITUS’ Intelligent Protection Offers Machine Learning Driven by Classification to Reduce Risk of Data Loss TITUS, a leading provider of data protection solutions, has announced TITUS Intelligent Protection, which adds breakthrough machine learning advances to its TITUS Classification Suite of solutions.  We were curious about this – and knew you […]

Machine Learning Capabilities Aid in Identifying and Protecting Critical Data

Guest Contributor: Idan Udi Edry, CEO of Trustifi. Massive hacking and data breaches of companies are on the rise—and no industry is exempt. Retailers, federal organizations, law firms, and social media and e-commerce sites have all recently been hacked. As of 2017, over 2.3 billion usernames and passwords from 51 […]

The Most Basic Ways Businesses Should Protect Their Emails

One of the more exciting new solutions we found at this year’s GSX Conference was a brand new access control solution from Openpath Security.  Founded in 2016 and headquartered in Culver City, CA, they offer the most stylishly modern solution we have ever seen. Probably the most notable advantage in […]

Access Control for the Modern Workplace

Homeowners are increasingly aware that security features could affect their finances further down the line and are opting to modernise their locking systems. In the UK, insurance companies usually ask for the type of locking systems installed on all outside doors of a house before providing a quote, with some […]

Savvy Homeowners Upgrade Security Features to Avoid Costly Insurance Premiums

This new solution enables an order of magnitude increase in protection capacity, allowing providers to augment their current redirect/scrubbing solutions with fast and accurate DDoS mitigation at the Internet edge Corero Network Security (LSE: CNS), a leading provider of real-time, high-performance, automated DDoS defense solutions, announced it has executed a global […]

Juniper Networks to offer Corero’s SmartWall DDoS Protection Software Products

With new data centre capacity needed at an ever-accelerating pace, rushing the delivery of a new facility significantly increases risk. Find out how off-site construction, integration and testing prior to final on site commissioning can deliver a fully customised data centre, on budget, with greatly reduced risk and in a […]

Data Centre Design and Build is Evolving – Here’s Why

New initiative to provide services and support for architecture and engineering firms Austin, Texas, Nov. 13, 2018 — Pivot3, a leading provider of security, Internet of Things (IoT) and hybrid cloud infrastructure solutions, today announced the introduction of the Pivot3 Architect and Engineer (A&E) Program. This initiative will provide architects, engineers and […]

Pivot3 Unveils A&E Program to Streamline Design and Deployment of ...

Recognized in Inc. Magazine’s 37th annual list of America’s Fastest Growing Companies, Omnigo continues to expand its customer base with new products, awards, acquisitions, and growth across target industries ST. LOUIS, MO. NOVEMBER 08, 2018 Omnigo Software, a leading provider of public safety, incident reporting, and security management solutions for […]

Omnigo Software Experiences Three-Year Revenue Growth of 187 Percent