Yearly Archives: 2025


In Episode S7E6 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Dmitri Vellikok, VP of Embedded Security at F-Secure, to discuss F-Secure’s newly launched Scam Kill Chain Framework and explore critical insights into how cybercriminals select and exploit their targets. Summary The Inspiration Behind Scam Kill […]

Inside the Mind of Cybercriminals: Unpacking F-Secure’s Scam Kill Chain





In an era of evolving cyber threats, brands must continuously evaluate the effectiveness of their security measures. A well-structured security framework safeguards sensitive data, ensures compliance with regulatory standards and maintains business continuity. Explore key methodologies for assessing security effectiveness, the importance of security audits and how advanced security technologies […]

Evaluating the Effectiveness of Current Security Measures in Protecting Business ...


In a significant advancement for enterprise cryptographic security, PKI Solutions has unveiled a groundbreaking feature—PKI Spotlight’s Multi-HSM Monitoring. This innovation marks the industry’s first and only vendor-agnostic solution designed specifically for unified monitoring of Hardware Security Modules (HSMs), encompassing both nCipher (Entrust) and Luna (Thales) devices, including their on-premises and […]

PKI Spotlight Unveils Unified Multi-Vendor HSM Monitoring Solution




In Episode S7E5, host Steven Bowcut speaks with Ian Amit, CEO and Founder of Gomboc AI. The conversation covers various aspects of Gomboc AI and its approach to computer science and cybersecurity. Ian shares his practical problem-solving philosophy and insights into the evolving landscape of cybersecurity, highlighting the impact of […]

Cloud Security: AI, Automation, and the Evolution in Cyber Defense


Medical identity theft occurs when a person uses someone else’s personally identifiable information or protected health information to commit insurance fraud, obtain free medical services or falsely secure prescription drugs. As a result, victims may be unable to access care, experience insurance issues and end up in medical debt.  This […]

10 Strategies to Secure Health Care Systems Against Identity Fraud


In Episode S7E4, David Matalon, CEO and Founder of Venn, joins Steven Bowcut to explore the evolving landscape of remote work security and the challenges of traditional Virtual Desktop Infrastructure (VDI). David shares insights into how financial services and other industries have struggled with data security, compliance, and usability in […]

Securing the Future of BYOD: Redefining Remote Work Security



Cyber threats against businesses grow every year. The onslaught of cyberattacks faced by businesses is relentless. When one of those attacks succeeds, it can take a steep toll on an organization, causing data loss, fines, legal fees, and reputational loss. Organizations are understandably eager to strengthen their security posture. To […]

Identity Hygiene: The Key to Implementing Seamless NIST and ISO ...


In an increasingly digital world, cyberattacks don’t exclusively target large corporations and governments anymore — even labor unions aren’t safe. The everyday person’s sensitive financial data and private member information are now compromised, urging labor coalitions to take proactive measures to protect themselves. Here’s a look at why these alliances […]

Labor Unions Are a New Target for Cyberattacks


Identity theft can quickly turn into a nightmare scenario that ruins people’s credit and adds unwanted stress. Cybercriminals use artificial intelligence (AI) and more sophisticated methods than in the past to access sensitive information. Understanding the emerging trends in identity theft can help security professionals and individuals strengthen protections and […]

Navigating the Latest Trends in Identity Theft