Comprehensive Analysis of Data Breach Investigations, Internal Threat Intelligence, and Security-Based Telemetry Reveals Cybercriminals are Becoming More Methodical and Adaptive Trustwave has released its 2019 Trustwave Global Security Report. This report reveals the top security threats, breaches by industry, and cybercrime trends from 2018.  Brilliance Security Magazine spoke with Karl […]

New Trustwave Report Underscores Progressing Global Cybersecurity Threats


One hundred percent of endpoint security tools eventually fail; complexity of device controls causes security gaps and significant risks Absolute (TSX: ABT), the leader in endpoint resilience, revealed that endpoint security tools and agents fail, reliably and predictably, based on findings from its new 2019 Global Endpoint Security Trends Report. From […]

Research Reveals That Endpoint Security Tools Fail, Reliably and Predictably


RealNetworks Launches SAFR™ for Security to Help Security Professionals Better Protect People and Valuable Assets Leading up to the hectic events of ISC West, Brilliance Security Magazine talked with Mike Vance, Senior Director of Product Management at RealNetworks to gain a better understanding of the announcement they planned for the […]

Brilliance Security Magazine talks with RealNetworks about SAFR™ for Security


Many of the cyberattacks that get coverage in the headlines are incredibly complex. As people hear about those, they sometimes forget about the less advanced tactics a person could use to infiltrate networks, like infecting thumb drives. An Arrested Person Carrying Low-Tech Gadgets Most people know the Florida resort called […]

Thumb Drives Are Still a Security Threat: What You Need ...



The security challenge that we will address in this episode is, how can you keep your endpoints updated and protected – particularly if you are a large enterprise? If you are a security practitioner for a large enterprise, this is likely a challenge you struggle with continuously. Whether it’s desktops, […]

How Can Large Enterprises Keep Endpoints Updated and Protected? – ...


By: John Evans and Sofia Cardante of Front Sight Protection Each year you will see lists of global risks from numerous security companies with no insight or analysis as to how they came up with these.  Many just pick buzzwords from the news and issues that they can profit on.  […]

What Global Risks will be faced in 2019 and 2020?


Welcome to Brilliance Security Magazine’s “Report Highlight”, where we review and highlight the findings of security industry research and reports. Today we are reviewing a rather remarkable report published by Vanson Bourne and commissioned by Continuum Managed Services. Entitled, Underserved and Unprepared: The State of SMB Cyber Security in 2019, […]

Report – The State of SMB Cyber Security in 2019


Home security is something that homeowners should always be aware of. And as technology improves, more advanced security solutions become available. You may have already considered better locks or cameras, but monitoring your house might not have seemed possible, but as video walls become more widely used they are now […]

Using video walls for home security



In this episode of “In 2 Minutes,” we will address the challenge of finding a way to quickly know if your systems have been compromised. We have all heard the stories about how it can be over six months before an organization figures out that their systems have been breached. […]

How to Quickly Know When You Are Under Attack – ...


You may have sensed the media and marketing buzz around converged security has been intensifying over the last few weeks. This is the normal course of things in the industry as we grow closer to what is arguably the most important conference and trade show for security end users and […]

It’s That Time Again – ISC West is Just Around ...


Everyone has had the experience of wondering exactly how in the world a company or organization obtained the information they have about them.  It may be the rapidity with which social media ads matching a product or service you barely more than just thought about are served up in your […]

Beyond PII: Finding and Mapping Derivative Behavior Data


By Marty Greenlow, CEO, Ensighten Today’s senior executives are under great pressure to transform their organizations for the digital world. Although this digital transformation imperative has been underway for several years now, we’re currently seeing a significant shift within the C-suite when it comes to ownership of these colossal undertakings. […]

The Implications of Shifting Digital Transformation Responsibilities



Ponemon Institute just released its Challenging State of Vulnerability Management 2019 report.  What can the results of this 600+ cybersecurity leaders and professionals survey teach us about the state of vulnerability management today? In a press release today, Balbix says: Balbix Inc., provider of the security industry’s first system built for avoiding […]

The Challenging State of Vulnerability Management: What Can We Learn ...


What if Sherlock Holmes was a robot?  This question is obviously designed to provoke thoughts on how the integration of automation and investigation could yield some interesting results.  Appropriately, it is being used as the tag line for SecBI’s current marketing campaign.  SecBI’s Autonomous Investigation technology provides automated detection and investigation that […]

What If Sherlock Holmes Was A Robot?


CEO of Montreal-based TrackTik Software is the visionary behind the company’s breakthrough technology that is transforming the physical security industry Montreal, April 16, 2019 — Simon Ferragne, CEO of Montreal-based TrackTik Software Inc., has been named a Top 10 under 40 security leader by Canadian Security Magazine. An industry visionary, Ferragne is […]

Simon Ferragne of TrackTik Software Named a Top 10 Under ...


Service that lets dealers’ clients order professional photo ID cards from custom-branded site will be demoed at ISC West LAS VEGAS—April 11, 2019—Security dealers and installers can now offer their customers personalized, secure photo ID cards via a new white-label service from InstantCard. It lets security dealers to easily add […]

Security Dealers Can Profitably Outsource ID Card Printing with New ...