The University of Phoenix has disclosed a data breach affecting nearly 3.5 million people, a reminder that when core enterprise platforms get hit, the fallout extends well beyond a single department or system. In this case, attackers exploited a critical, then-unknown vulnerability in Oracle E-Business Suite (EBS), accessed sensitive records, […]

University of Phoenix Discloses 3.5M-Record Data Breach Linked to Oracle ...


Access risk is an invisible liability that never shows up on balance sheets, shipping schedules, or vendor scorecards. It silently builds up through unmanaged accounts and unmonitored logins, stalling operations, straining supply chains, and eroding the trust that businesses depend on. Identity and access management (IAM) is intended to reduce […]

The Silent Risk in Your Supply Chain – Excess Access ...


Human resources sits close to the center of most organizations’ trust networks. Very few teams touch as much sensitive material with as little friction. Social engineers view that position as leverage, which has led to a rise in attacks aimed at HR functions. Here’s how deceptive actors favor human fallibility […]

How Social Engineers Use the HR Department as an Attack ...



In Episode S7E23 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Linda Calvin, the new Dean of the School of Technology at Western Governors University (WGU). Since stepping into the role in September, Linda has brought her deep experience in technology education, workforce development, and community […]

Reimagining Cybersecurity Education with WGU’s Linda Calvin


Organizations opt for multiple cloud platforms primarily for flexibility and resilience. They distribute workloads across different providers and avoid vendor lock-in. However, the more a company uses best-of-breed services for each need, the wider the attack surface becomes. How should IT teams balance these challenges while continuing to reap the […]

How to Improve Network Security for Multicloud Environments


IT professionals, cybersecurity analysts and industrial technicians all have a commonality — a desire to protect critical infrastructure. Utilities like HVAC systems are among the most critical for smooth operations, but they also open numerous backdoors for cyber threats. For some companies, HVAC technology cybersecurity is their biggest oversight in […]

Is Your HVAC System Your Facility’s Biggest Security Blind Spot?



Security teams have more than enough data telling them what’s wrong; they just don’t have enough telling them what’s the most wrong.  Which is where exposure assessment platforms (EAPs) come in.  Gartner formally recognized the importance of EAPs in its inaugural Magic Quadrant for EAPs, a landmark milestone for the […]

Why Exposure Management Platforms Are Reshaping Cybersecurity


By Yogita Parulekar Security leaders are moving as fast as their budgets and practical organizational considerations allow them to embrace security principles like “secure-by-design”, “zero trust,” and “defense in depth” to strengthen cybersecurity and resilience.  Yogesh Badwe, CSO at Druva, notes that proactive security, including the Secure-by-Design principle, is now […]

From Security Tax to Security Dividend: Making the Business Case ...




Cybercrimes are becoming increasingly common as operations across various industries transition online. Real estate is a primary target because buying and selling houses is an incredibly lucrative business. Cybercriminals are continually developing new methods to commit fraud and steal people’s information. What Is Real Estate Cyber Fraud? Real estate cyber […]

Real Estate Cyber Fraud: How It Works & What to ...


In Episode S7E22 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Dan Benveniste, Founder and CEO of SkillWaze, to explore how innovation and AI are reshaping the way organizations identify, develop, and hire cybersecurity talent. Together, they discuss how SkillWaze’s unique approach bridges the gap between […]

Reimagining How We Develop and Hire Cyber Talent


AI in cybersecurity has been around for years, flagging anomalies, parsing logs, and powering threat detection models. Since the public release of GenAI, it has been used to pull more data in at scale and draw conclusions from massive amounts of telemetry. But at the end of the day, SOCs […]

5 Real-World Use Cases of AI SOC Agents in Modern ...