Welcome to Brilliance Security Magazine’s “Report Highlight”, where we review and highlight the findings of security industry research and reports. Today we are reviewing a rather remarkable report published by Vanson Bourne and commissioned by Continuum Managed Services. Entitled, Underserved and Unprepared: The State of SMB Cyber Security in 2019, […]

Report – The State of SMB Cyber Security in 2019


Home security is something that homeowners should always be aware of. And as technology improves, more advanced security solutions become available. You may have already considered better locks or cameras, but monitoring your house might not have seemed possible, but as video walls become more widely used they are now […]

Using video walls for home security


In this episode of “In 2 Minutes,” we will address the challenge of finding a way to quickly know if your systems have been compromised. We have all heard the stories about how it can be over six months before an organization figures out that their systems have been breached. […]

How to Quickly Know When You Are Under Attack – ...


You may have sensed the media and marketing buzz around converged security has been intensifying over the last few weeks. This is the normal course of things in the industry as we grow closer to what is arguably the most important conference and trade show for security end users and […]

It’s That Time Again – ISC West is Just Around ...



Everyone has had the experience of wondering exactly how in the world a company or organization obtained the information they have about them.  It may be the rapidity with which social media ads matching a product or service you barely more than just thought about are served up in your […]

Beyond PII: Finding and Mapping Derivative Behavior Data


By Marty Greenlow, CEO, Ensighten Today’s senior executives are under great pressure to transform their organizations for the digital world. Although this digital transformation imperative has been underway for several years now, we’re currently seeing a significant shift within the C-suite when it comes to ownership of these colossal undertakings. […]

The Implications of Shifting Digital Transformation Responsibilities



Cybersecurity Startup Competes Against Top Vendors at DreamPort’s Insider Threat Attack Competition NEW YORK—Jazz Networks – a cybersecurity intelligence company – announced today that it placed first in a competition to detect insider threat attacks in real-time during a simulated U.S. Cyber Command battlefield. DreamPort is a cyber innovation and […]

Jazz Networks Wins U.S. Cyber Command Competition