Monthly Archives: September 2025


Artificial Intelligence is driving rapid innovation across industries—but it’s also creating new risks, uncertainties, and regulatory challenges. How can enterprises adopt AI with confidence, ensuring it remains safe, compliant, and trustworthy? On Episode S7E18 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Mark Stadtmueller, Chief Technology […]

AI Governance: Balancing Innovation, Compliance, and Trust


Dealing with a loved one’s death is a difficult and vulnerable time. Unfortunately, cybercriminals and fraudsters can exploit this period to manipulate grieving families and benefit from the estate. Understanding the mechanisms behind these attempts can help a deceased person’s family and loved ones protect themselves from cyberattacks. How Attackers […]

Social Engineering the Bereaved: How Attackers Exploit Grief to Compromise ...


SACRAMENTO, Calif. — September 24, 2025 —Rhombus, a leader in cloud-managed physical security solutions, today announced the launch of Rhombus Insights, an AI-powered solution that empowers businesses to measure virtually anything their cameras can see and automate responses based on those specific observations. The launch is a significant expansion of Rhombus’ AI […]

Rhombus Creates Unprecedented Opportunities for Optimizing and Securing Physical Spaces ...



Business doesn’t stand still, and neither should access. Modern enterprises don’t just rely on employees; they depend on suppliers, distributors, brokers, and partners — all of them are third-party identities needing access to critical systems. These relationships are fluid: teams form and disband, roles shift, projects start and stop. Static […]

Why Access Should Evolve as Fast as Your Business Does


People install security cameras to maintain privacy or add a layer of security. Unfortunately, criminals might use devices meant to safeguard a home as surveillance tools. The more interconnected devices and systems become, the greater the risk of a security breach. Common mistakes can expose you to risk and allow […]

The Growing Risk of Cyberattacks on Security Cameras


In Episode S7E17 of the Brilliance Security Magazine Podcast, we explore how organizations can successfully navigate modernization within the Microsoft ecosystem. Host Steven Bowcut is joined by Julian Hamood, Founder and Chief Visionary Officer of TrustedTech. With nearly 20 years of experience in IT solutions and enterprise security, Julian has […]

From Licensing to AI: Tackling Cyber Risks in Microsoft Environments



E-commerce gives criminals fast payment rails, global reach and thousands of buyer and seller accounts that can hide dirty money. Because launderers now treat online marketplaces like their favorite cash-out lane, security teams can no longer ignore this shift. They must watch the storefront, the checkout flow and the seller […]

The FinCrime Connection: How Money Launderers Exploit E-Commerce Platforms


Industrial control systems (ICS) are integrated hardware and software products that help large-scale providers — such as manufacturers, government agencies and utility companies — manipulate processes. ICS security has become a hot topic, especially as hackers target the technologies controlling some of the most critical infrastructure. How can IT professionals […]

Are Your Industrial Control Systems Ready for Modern Cyberthreats?




Agentic artificial intelligence (AI) is starting to play a larger role in cybersecurity. These tools can scan threats and automate tasks that once took cybersecurity teams hours to complete. Businesses adopt agentic AI systems because of their fast responses and strong defenses. However, they can bring new risks that companies […]

5 Challenges of Integrating AI Agents Into Your Cybersecurity Strategy


Welcome to the Brilliance Security Magazine Podcast with host Steven Bowcut. In Episode S7E16, Tony Garcia, Chief Information and Security Officer at infineo, joins us to unpack how a fast-moving fintech secures internal AI systems and safeguards the intellectual property they create. infineo is modernizing the $3 trillion life insurance industry by tokenizing policies on […]

Securing AI Systems: Protecting Models, Data & IP


In an increasingly adversarial cyber landscape, image exploits—malicious code hidden within seemingly harmless media files—have become one of the stealthiest and most powerful threat vectors. Designed to evade detection, these attacks exploit the complexity of image processing libraries and trusted workflows, often requiring zero user interaction. The consequences range from […]

Image Exploits: The Silent Weapon Hidden in Plain Sight