Comments Sought on Draft Guide to Enhance Cybersecurity Framework September 15, 2016 WASHINGTON, D.C.— The U.S. Commerce Department(link is external)’s National Institute of Standards and Technology (NIST) released today the draft Baldrige Cybersecurity Excellence Builder, a self-assessment tool to help organizations better understand the effectiveness of their cybersecurity risk management […]

NIST Releases Baldrige-Based Tool for Cybersecurity Excellence

Today’s Most Interesting Security News Stories Are you kidding me?  This story is great because it illustrates how much more we need to do with regards to educating the public about the dangers of poor password security. Read the story to see the list of terrible passwords used by Ashley […]

The Worst Password from the Ashley Madison Hack

Brilliance Security Consulting caught up with Brian Czarny (it’s easy, the C is silent, Brian said), Senior Vice President of Marketing for TeleSign, at the Black Hat 2015 Conference in Las Vegas. His explanation of who TeleSign is and what they do is quite fascinating. Who do big consumer facing […]

Who Is Protecting Your Identity When You Create An Account ...

Brilliance Security Magazine sat down with Professor Yehuda Lindell, Chief Scientist & Co-founder, of Dyadic at Black Hat 2015.  Dyadic delivers encryption and authentication solutions by having private keys split between multiple locations, safe from rogue admins, stolen credentials, device compromise or any single zero-day or malware. Prof. Lindell said […]

How Do You Keep A Secret Key Secret?

Known as the first person a hacker calls when in trouble, Jennifer Granick, Director of Civil Liberties for the Center for Internet and Society at Stanford Law School gave the opening keynote speech for the Black Hat 2015 conference in Las Vegas, August 5th. Considered by many to be a […]

Black Hat 2015 Keynote – The Lifecycle of a Revolution

Brilliance Security Consulting, in partnership with Brilliance Security Magazine is proud to offer a limited subscription premier source for news and information about Active Cyber Defense; Hack-Back Magazine. Cybersecurity is too one sided.  The bad actors are always on offense and business is left with only defensive measures. Hack-Back Magazine is a […]

Active Cyber Defense or Hacking Back