Cybercrimes are becoming increasingly common as operations across various industries transition online. Real estate is a primary target because buying and selling houses is an incredibly lucrative business. Cybercriminals are continually developing new methods to commit fraud and steal people’s information. What Is Real Estate Cyber Fraud? Real estate cyber […]

Real Estate Cyber Fraud: How It Works & What to ...


In Episode S7E22 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Dan Benveniste, Founder and CEO of SkillWaze, to explore how innovation and AI are reshaping the way organizations identify, develop, and hire cybersecurity talent. Together, they discuss how SkillWaze’s unique approach bridges the gap between […]

Reimagining How We Develop and Hire Cyber Talent



AI in cybersecurity has been around for years, flagging anomalies, parsing logs, and powering threat detection models. Since the public release of GenAI, it has been used to pull more data in at scale and draw conclusions from massive amounts of telemetry. But at the end of the day, SOCs […]

5 Real-World Use Cases of AI SOC Agents in Modern ...


All industries can feel the benefits of digital transformation. Companies seek numerous competitive advantages by implementing as many technological tools and programs as possible. However, introducing many new devices increases the likelihood of a cybersecurity attack. Businesses need more effective defensive strategies to mitigate the devastating effects of cyberattacks. Video […]

How to Maintain Cybersecurity During Digital Transformation


Outdoor environments are among the most challenging spaces to secure, constantly shifting, exposed to risk, and often under-prioritized in security planning. As threats become more opportunistic and less predictable, organizations are rethinking how they safeguard sites that fall outside fixed, facility-based models. In our work across Northern California, we’ve seen […]

Why Mobile Surveillance Is Gaining Ground: A Regional Look at ...



In Episode S7E21 of the Brilliance Security Magazine Podcast, host Steven Bowcut speaks with Dr. Masoud Nafey, Founder of Ment, an AI-driven relationship intelligence platform built on a foundation of privacy and authenticity. Together, they explore how artificial intelligence can help professionals build and nurture meaningful relationships without compromising personal […]

AI, Privacy, and the Future of Human Connection


Users often view passwords as a nuisance, and creating them feels like a waste of time. Because of this mindset, security and best practices are not being used to create different, protective passwords for accounts. There is psychology behind this phenomenon, as well as some tips to keep in mind […]

Password Psychology: Why Do People Still Use Weak Passwords?


A new study from Ontario Tech University, PureSquare, and CQR Cybersecurity is shedding light on a paradox at the heart of modern personal cybersecurity: consumers are spending more time and money than ever managing multiple security tools—yet are often less secure as a result. The research, titled “The Cost of […]

Security Tool Overload: How Fragmentation Makes Users Less Safe



Manufacturing ransomware attacks can severely limit operations, taking all systems offline or making critical data inaccessible. Because these threats have become more prominent, many decision-makers prioritize cybersecurity for manufacturers, knowing their lack of attention could have significant and lasting consequences. Why have cybercriminals focused on this group of potential targets?  […]

Why Are More Ransomware Attacks Targeting Manufacturers?


With growing global risks threatening cybersecurity, third-party risk management (TPRM) is critical. Businesses outsource to vendors to improve data security, but due to an increasingly digitized world, third parties may also pose a significant risk to security. To ensure safe TPRM practices, it is essential to understand the red flags […]

Are Your Security Vendors a Ticking Time Bomb? A Guide ...


Deepfakes pose a significant challenge for crisis communication teams. In the time it takes to issue a response, a fake video, image or sound clip can spread disinformation, damage reputations and erode trust. For those in security and communications, the question is not if this will happen, but how ready […]

Protecting Crisis Communications From AI Deepfake Attacks