Monthly Archives: March 2020


I want to introduce you to David. David is the Chief Information Security Officer for a sizeable financial institution. He is an educated career professional, a loving husband, and a devoted father. He takes his job as CISO very seriously. The responsibility of protecting his organization’s digital assets, including sensitive […]

A Security Patch for Your People


Security technology has not kept up with today’s accelerated move toward virtual infrastructure and disappearing network boundaries. Advanced hackers are quickly exploiting application vulnerabilities with fileless and memory-based attacks. A new security approach is needed to counter these sophisticated threats. Methods that do more than monitor the perimeter and that […]

Advanced Application Attacks Put Businesses at Risk


Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management



The use of encryption to protect against cyber threats is growing exponentially. Unfortunately, cybercriminals also leverage encryption to hide malware, ransomware, and other attacks.  Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As […]

Analyzing Encrypted Network Traffic


The Department of Defense (DoD) is taking new measures to increase IT security. To protect against cybercrime from all sources, the DoD has worked on a new standard for its contractors. The result is the Cybersecurity Maturity Model Certification (CMMC). The government’s made an effort to improve national cybersecurity for some […]

DoD Implements Cybersecurity Regulation to Protect Against Data Breaches


As millions of workers move from the confines of their employer’s network to apply safe physical distancing measures by working from home, securing data gets more complicated. Providing adequate protection for your critical data can be even more challenging if your VPN just wasn’t designed for the level of traffic […]

The Importance of Extending Your Security Policies to the Cloud




Work From Home (WFH) Employees Across Business and Government Organizations of All Sizes Can Now Quickly, Easily and Securely Access Work Computer, and All Associated Data, from Home All Set-up, Configuration and Tech Support Also Provided Completely Free-of-Charge FORT COLLINS, Co. – March 18, 2020 – DH2i®, a leading provider of multi-platform Software […]

DH2i Launches DxOdyssey Work From Home Software – Completely Free ...




As part of our efforts to bring our readers the most exciting and innovative technologies to be found at RSAC 2020, Brilliance Security Magazine sat down with SIRP to discuss their compelling new SOAR solution. SIRP is a Risk-based Security Orchestration, Automation, and Response (SOAR) platform that fuses essential cybersecurity information to […]

Risk-based SOAR


The Shared Assessments Program Third-party risk management (TPRM) is the process of examining and managing risks associated with outsourcing to third-party vendors or service providers. This process could include access to an organization’s intellectual property, data, operations, finances, customer information, or other sensitive information.  While third-party risk has historically been […]

Third-party Risk Management