by Peter Kelley, Owner, Kelley Group Two The fifth annual extensive study on third party risk, “Running Hard to Stay in Place,” released by Shared Assessments and Protiviti, is broken down by industry sectors and program maturity criteria. This year’s study has some very interesting findings: Awareness of third party […]

Running Hard to Stay in Place


Every day, companies deal with a growing amount of unstructured data, or information not organized in a predefined way. We know that such vast collections could result in companies missing out on the value such information could bring them. Even worse, it could cause security risks, especially if the unstructured […]

Meet Fasoo: A Company Helping to Protect Unstructured Data


Cloud-based applications are becoming commonplace and bring with them a host of benefits for both user and developer.  Cloud applications can be updated, tested, and deployed quickly, providing enterprises with the agility needed to compete in today’s business environment.  Cloud-based applications don’t come without additional risk, however.  For a cloud-based […]

Runtime Encryption – What You Need To Know


Guest Contribution By Secure-IC The Internet of Things offers unprecedented opportunities to customize and even share digital services in everybody’s life. Your private car can be lent or rented through a mobile app, your favorite music/series can be enjoyed on multiple devices whilst fully respecting owners rights. Such fluidity in […]

Internet of Things Offers Unprecedented Opportunities to Customize Digital Services



Guest Contribution By: Apache Security, South Africa There are various sectors and industries which should aim to make surveillance system installation and monitoring a part of their security solutions. Surveillance security, through the use of CCTV equipment, can provide many benefits. So, who should make use of surveillance security? Domestic […]

CCTV Monitoring: Who Should Make Use of Surveillance Security?


Large scale ransomware attacks are projected to cost the global economy $193B One of the security challenges that companies face is how to protect their important data from ransomware and other cyber threats.  Ransomware can hold company files or devices hostage, using encryption or other means, until the victim pays […]

Endpoint Solutions Aren’t Protecting Businesses Against Ransomware Attacks


By: Jeremy Martin, Director – 27K1 Ltd ISO 27001 – Information Security in an unstable world During the present political turmoil of Brexit, here in the UK, British companies and our European trading partners are unable to rely upon a “Business As Usual” approach to established commercial relationships. Change is […]

ISO 27001 – Information Security in an unstable world


Comprehensive Analysis of Data Breach Investigations, Internal Threat Intelligence, and Security-Based Telemetry Reveals Cybercriminals are Becoming More Methodical and Adaptive Trustwave has released its 2019 Trustwave Global Security Report. This report reveals the top security threats, breaches by industry, and cybercrime trends from 2018.  Brilliance Security Magazine spoke with Karl […]

New Trustwave Report Underscores Progressing Global Cybersecurity Threats



One hundred percent of endpoint security tools eventually fail; complexity of device controls causes security gaps and significant risks Absolute (TSX: ABT), the leader in endpoint resilience, revealed that endpoint security tools and agents fail, reliably and predictably, based on findings from its new 2019 Global Endpoint Security Trends Report. From […]

Research Reveals That Endpoint Security Tools Fail, Reliably and Predictably


RealNetworks Launches SAFR™ for Security to Help Security Professionals Better Protect People and Valuable Assets Leading up to the hectic events of ISC West, Brilliance Security Magazine talked with Mike Vance, Senior Director of Product Management at RealNetworks to gain a better understanding of the announcement they planned for the […]

Brilliance Security Magazine talks with RealNetworks about SAFR™ for Security


CEO of Montreal-based TrackTik Software is the visionary behind the company’s breakthrough technology that is transforming the physical security industry Montreal, April 16, 2019 — Simon Ferragne, CEO of Montreal-based TrackTik Software Inc., has been named a Top 10 under 40 security leader by Canadian Security Magazine. An industry visionary, Ferragne is […]

Simon Ferragne of TrackTik Software Named a Top 10 Under ...


Many of the cyberattacks that get coverage in the headlines are incredibly complex. As people hear about those, they sometimes forget about the less advanced tactics a person could use to infiltrate networks, like infecting thumb drives. An Arrested Person Carrying Low-Tech Gadgets Most people know the Florida resort called […]

Thumb Drives Are Still a Security Threat: What You Need ...



For second consecutive year, employees are aware of the risks associated with inadequate USB drive security – but aren’t following best practices Apricorn, the leading manufacturer of software-free, 256-bit AES XTS hardware-encrypted USB data storage devices, announced results of its latest report, “The State of USB Data Protection 2019: Employee […]

Apricorn Report Reveals Majority of Employees Use Non-Encrypted USB Drives ...


Simon Ferragne recognized as an innovative business leader for his global impact on the security workforce industry Ottawa, ON, May 16, 2019 — Simon Ferragne, CEO of Montreal-based TrackTik Software Inc., has been presented The Peter Brojde Award for Canada’s Next Generation Executive Leadership for his role in developing first-of-its-kind technology that […]

TrackTik Software CEO Receives Prestigious Technology Innovation Award


The industries most anticipated and most comprehensive report covering data breaches has been released in its 2019 edition.  This year the report is nearly 80 pages and includes contributions from 73 contributing organization.  This report is built upon the analysis of 41,686 security incidents, of which 2,013 were confirmed data […]

2019 Data Breach Investigations Report – See reactions and get ...