Steven Bowcut


To say that the COVID-19 pandemic has disrupted operations around the world is the understatement of the decade. That being said, businesses and governments are under mounting pressure to restart their operations as quickly as possible. With social distancing and other measures helping to curtail the spread, organizations are turning […]

How We Can Effectively Restart Operations While Protecting Our Employees’ ...


AI-based platform and mobile application delivers the value of data to transform health monitoring during COVID-19 Northridge, Calif. —Davista, a provider of artificial intelligence for physical security and law enforcement, today announced the availability of its AI-powered social distancing platform. The solution is designed to help businesses, organizations, and government agencies ensure […]

DAVISTA SOCIAL DISTANCING SOLUTION ENSURES A SAFE RETURN TO WORK


Survey finds CISOs highly interested in automation to address major concerns about doing more with less, preparing for audits remotely, and speeding evidence collection  Seattle, Wash – September 15, 2020 – Shujinko, the pioneer in automated audit preparation, today announced the results of a survey of North American CISOs documenting the […]

New Research Shows CISOs Struggling to Prepare for Upcoming Security ...




In this week’s podcast episode we talk with Perry Carpenter, Chief Evangelist, and Strategy Officer with KnowBe4. We discuss KnowBe4’s new research arm, KnowBe4 Research, and their recently released Security Culture Report. In the 2020 “Security Culture Report”, data was collected from 120,050 employees in 1,107 organizations across 24 countries. […]

Security Culture Report Finds a Large Gap Exists Between the ...


In this week’s podcast episode we talk with Ameet Naik a security evangelist at PerimeterX. PerimeterX, a leading provider of application security solutions that keep digital businesses safe, recently released “Shadow Code: The Hidden Risk to Your Website.” This second annual survey of security professionals uncovers the extent and impact of […]

Shadow Code: The Hidden Risk to Your Website



The widespread decision corporations have made to allow employees to work from home is a great thing, but it also poses added vulnerabilities, including increased risk of browser attacks, unsecured wireless networks and inability to remediate remote security incidents. Attackers are highly innovative and can use the latest technology to […]

Shoring Up Security in a WFH World


Survey of IT and cybersecurity decision-makers reveals 20 percent of organizations experienced a breach as a result of remote work In Episode S2E7 we have a delightful conversation with Adam Kujawa, Director of Malwarebytes Labs. Adam talks about Malwarebytes’ insightful new report that was released on August 20, 2020. This […]

COVID-19’s Impact on Business Security


With a recent announcement, Senserva launched a new product, dubbed SenservaPro. This patent-pending solution is a serverless cloud platform that keeps a company’s data, user accounts, and cloud environment secure through interactive user review and risk assessment of a client’s accounts and configurations.  Founded by Internet security pioneer Mark Shavlik, […]

New Security Platform for Managing Microsoft 365 and Azure Active ...



DDoS attacks continue to grow in frequency, intensity, and sophistication. Listen to this episode of the Brilliance Security Magazine Podcast to learn more about why DDoS attacks are increasing and what can be done.  In Episode S2E6, we discuss the new A10 Networks report on the State of DDoS Weapons. […]

The State of DDoS Weapons


It’s not exactly an age-old question, but one that gets a lot of attention these days. To be generous, let’s assume that everyone is interested in adhering to behavior that is suggested by public health officials as a way to protect themselves and others from the coronavirus. But, sometimes we […]

To Mask or Not to Mask?


It’s no secret that cybercriminals are always upping the ante, but while ransomware is still in the spotlight, it’s even more devastating cousin, leakware, doesn’t receive as much attention. In this episode, we talk with Nir Gaist, a senior information security expert and ethical hacker to learn more about leakware […]

What You Need to Know About Leakware