Cybersecurity


Siemplify, the leading independent provider of security orchestration, automation and response (SOAR) has released a new version of its security operations platform. “Version 5.0 continues to raise the bar for end-to-end security operations management, adding new capabilities that make security analysts more productive, security engineers more effective and SOC managers more informed […]

Siemplify Enhances Security Operations Platform


New Study Underscores the Need for Affordable, Accessible Security Solutions SolarWinds, a leading provider of powerful and affordable IT management software has released findings from a new IDC® White Paper, Affordable Tools and Shared Responsibilities Define Midmarket IT Security Trends, sponsored by SolarWinds.The white paper is based on a survey of both IT […]

SolarWinds Finds Insider Threats Cited as Leading Cause of Security ...


An announcement by A10 Networks today has all the indicators of a significant improvement in what is now possible for DDoS defense capabilities. Noting that the time is now for DDoS defense to bring its ‘A’ game, A10 Networks announced it is adding Zero-day Automated Protection (ZAP) capabilities to its […]

DDoS Defense Steps Up A Notch



As you are likely aware by now, Quest Diagnostics – one of the biggest blood testing providers in the country – warned Monday that nearly 12 million of its customers may have had personal, financial, and medical information breached due to an issue with one of its vendors. This kind […]

Quest Diagnostics Breach – What the Experts are Saying



A massive database containing the contact information of millions of Instagram influencers, celebrities, and brand accounts has been exposed online. The database, hosted by Amazon Web Services, was left without a password allowing anyone to look inside.  It is thought that the database has over 49 million records. Discovered by […]

Instagram Influencers Account and Contact Information Exposed – What the ...



The industries most anticipated and most comprehensive report covering data breaches has been released in its 2019 edition.  This year the report is nearly 80 pages and includes contributions from 73 contributing organization.  This report is built upon the analysis of 41,686 security incidents, of which 2,013 were confirmed data […]

2019 Data Breach Investigations Report – See reactions and get ...



Cloud-based applications are becoming commonplace and bring with them a host of benefits for both user and developer.  Cloud applications can be updated, tested, and deployed quickly, providing enterprises with the agility needed to compete in today’s business environment.  Cloud-based applications don’t come without additional risk, however.  For a cloud-based […]

Runtime Encryption – What You Need To Know



Guest Contribution By Secure-IC The Internet of Things offers unprecedented opportunities to customize and even share digital services in everybody’s life. Your private car can be lent or rented through a mobile app, your favorite music/series can be enjoyed on multiple devices whilst fully respecting owners rights. Such fluidity in […]

Internet of Things Offers Unprecedented Opportunities to Customize Digital Services


Large scale ransomware attacks are projected to cost the global economy $193B One of the security challenges that companies face is how to protect their important data from ransomware and other cyber threats.  Ransomware can hold company files or devices hostage, using encryption or other means, until the victim pays […]

Endpoint Solutions Aren’t Protecting Businesses Against Ransomware Attacks


Comprehensive Analysis of Data Breach Investigations, Internal Threat Intelligence, and Security-Based Telemetry Reveals Cybercriminals are Becoming More Methodical and Adaptive Trustwave has released its 2019 Trustwave Global Security Report. This report reveals the top security threats, breaches by industry, and cybercrime trends from 2018.  Brilliance Security Magazine spoke with Karl […]

New Trustwave Report Underscores Progressing Global Cybersecurity Threats