Steven Bowcut


As artificial intelligence becomes more sophisticated, so too do the tools used by cybercriminals. One of the most alarming developments in recent years is the rise of AI-enhanced social engineering—a fusion of psychological manipulation and machine learning that poses a serious threat to individuals and small businesses alike. In this, […]

Understanding AI-Enhanced Social Engineering


In Episode S7E13 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with cybersecurity veteran Jim Alkove to discuss the evolving landscape of identity security. With over 25 years in the industry and leadership experience at Microsoft, Salesforce, and now as CEO of Oleria, Jim shares unique insights […]

Uncovering the Blind Spots in Modern Identity Security


Protecting Yourself from the Rise of SMS Phishing Attacks Smishing—short for SMS phishing—is a cyber threat that’s gaining ground quickly, targeting people through the one device they rarely put down: their mobile phone. These text-based scams are designed to trick individuals into revealing personal information, downloading malware, or clicking on […]

How to Recognize and Avoid Smishing Scams




Phishing remains one of the most prevalent cybersecurity threats today, particularly for individuals and small businesses. Understanding what these attacks look like is crucial for effective protection. As cybercriminals become increasingly sophisticated in their tactics, it is essential that users recognize the signs and know how to respond effectively. Understanding […]

What a Phishing Attack Looks Like for Individuals and Small ...


In Episode S7E12 of the Brilliance Security Magazine Podcast, host Steven Bowcut is joined by Steve Bassett, Senior Director of Security Consulting at GMR Security. With over three decades of experience in physical security operations, Steve shares insights on how organizations, particularly large, multi-site enterprises, can successfully modernize their physical […]

Bridging Strategy and Technology: Modernizing Physical Security for Complex Organizations




In a significant advancement for identity security, SpecterOps has unveiled a powerful new feature called Privilege Zones in its flagship BloodHound Enterprise (BHE) platform. Announced on June 11, 2025, the addition expands the platform’s capability to proactively defend against identity-based threats by creating logical boundaries around mission-critical assets and enforcing […]

SpecterOps Boosts Identity Defense with New Privilege Zones Feature


What if the world’s most trusted cryptographic systems could be broken in just minutes instead of centuries? In this thought-provoking Episode S7E10 of the Brilliance Security Magazine Podcast, David Close, Chief Solutions Architect at Futurex, joins host Steven Bowcut to discuss the very real—and rapidly accelerating—threat that quantum computing poses […]

Quantum Threats to Encryption May Be Closer Than You Think



In Episode S7E9 of the Brilliance Security Magazine Podcast, we sit down with Matt Stern, Chief Security Officer at Hypori, to discuss how organizations can move beyond outdated mobile device management strategies and adopt a zero-trust approach to the future. Stern shares compelling insights from his extensive experience in both […]

Rethinking BYOD: From Legacy Risks to Zero Trust Mobility


In Episode S7E8, Steven welcomes Arvind Parthasarathi, founder and CEO of CYGNVS, to discuss reinventing cyber incident readiness and response collaboration. Arvind shares his background in analytics and cybersecurity, explaining how CYGNVS was created to address the chaos organizations face during major cyber incidents. The conversation covers the importance of […]

Reinventing Cyber Incident Readiness and Response Collaboration


A New Era of Cyber Threat Intelligence Begins In a move that could redefine how cybersecurity professionals confront pre-attack threats, Desired Effect has officially launched the Desired Effect Marketplace—the industry’s first ethical market for vulnerability and exploit intelligence. The platform enables organizations and independent security researchers to trade in zero-day […]

Ethical Exploit Market Aims to Outpace Hackers and Aid Defenders