admin



(Video Transcript) For terrorists – which would include anyone seeking to strike terror into the hearts of large numbers of people – soft targets are a practical convenience with symbolic value. Soft targets are defined as those potential victims, or victim groups, that are relatively unprotected or vulnerable.  Usually because […]

Soft Targets – What can be done to protect them




This is “In 2 Minutes,” brought to you by Brilliance Security Magazine, and today we will tell you what you need to know about Ransomware, specifically the 2017 Ransomware Report by Cybersecurity Insiders. Ransomware is a billion dollar cybercrime industry and is widely seen as the single biggest cybersecurity threat […]

In 2 Minutes: Ransomware, what you need to know


The Internet Security Law of the People’s Republic of China puts proprietary information of companies that conduct business in China, or that hire Chinese citizens, at risk – or at least that is what is being reported by international media and U.S. Government agencies.  On the face of it this […]

The Internet Security Law of the People’s Republic of China ...


On September 21, 2017, Rex W. Tillerson, U.S. Secretary of State, addressed The United Nations Security Council in New York City.  The focus of his remarks was the worldwide implications of nuclear proliferation.  While affirming that the threat of nuclear attack is a grim reality of today’s world, Secretary Tillerson […]

Rex Tillerson: The Threat of a Nuclear Attack Remains a ...





by: Sripati MS Information Security Consultant at a leading security service provider in Oman   I came across this rant (with the usual don’t-kill-me-am-just-making-a-random-statement-and-fully-intend-to-get-away-with-it disclaimer) on LinkedIn about how CISO’s are clueless about how a virus works, even with CISA/CISM and a decade’s experience under their belt. It got me seething about how this statement is […]

Please don’t kill your CISO if he doesn’t know how ...









Schneider Electric Study Highlights Cross-Industry Trend to Move Security Applications to the Cloud Almost half of IT and security leaders surveyed are likely or extremely likely to transition security operations to the cloud in the future Leaders encourage technological advancements, yet barriers prevent organizations from achieving their security goals ANDOVER, […]

Cloud Security – By the Numbers