by: Steve Bowcut


Read all three pages of this infographic to understand the unique insight that Angela Oborne, Regional Director – Security & Technology Consulting at Guidepost Solutions brings to the security industry. You will learn about: The ASIS Young Professionals Council’s recent research How Millennials fit into the security industry What the […]

Guidepost Solutions – Angela Osborne – ASIS Young Professionals Council


With the ever-evolving threat landscape, increased concern regarding cybersecurity, and the convergence of IT operations and security, many believe that cybersecurity programs must take an all-inclusive approach in addressing security incidents and data breaches. Traditional incident response models primarily offer technical guidance; they are not designed to help organizations gain […]

Going Beyond Incident Response


Deception is a breach detection tactic that utilizes decoys and misinformation to divert and delay an adversary.  As part of your overall cybersecurity strategy, this tactic gives the SOC / IR teams sufficient time to perform remediation before an adversary can complete their mission.  Deception is not generally used to […]

Decoys, Deception Sensors, and Breadcrumb Data – What’s a Hacker ...



Employee mobility, BYOD, virtualization, and cloud services have all combined together to present organizations with a large and fluid environment for which they must identify and manage the vulnerabilities of every asset on the network.  A vulnerability scanner can help with this task by assessing computers, systems, and apps for […]

How do you manage vulnerabilities for your ever-changing IT attack ...


The Canadian Broadcasting Corporation (CBC) reported today that Air Canada admits the personal information for about 20,000 customers “may potentially have been improperly accessed” via a breach in its mobile app, so the company has locked down all 1.7 million accounts as a precaution until customers change their passwords. A banner […]

Air Canada Says 20,000 Mobile App Users Hit by Data ...




The frequency and urgency of conversations about Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA), and Operational Technology (OT) network security are definitely on the rise. Everywhere you look there are articles, presentations, webinars, and claims of new and better solutions crowding this previously uncrowded space. To help […]

The Simplest and Most Comprehensive Way to Address ICS Risk


For some organizations, the ability to communicate privately is an absolute must, even a life or death situation. For these entities, which consist mostly of government agencies, law firms, and Fortune 100 companies, critical information getting into the wrong hands can be disastrous. To give you, our readers, a glimpse […]

Allowing really important people who need to talk about really ...




Today’s endpoint positive security goes far beyond the whitelisting of yesteryear.  Sometimes called OS-Centric Positive Security, current positive security models focus on the damage stage of the attack.  While attack strategies are ever changing and are nearly unlimited, the intentions of the attacker in the damage stage remains fairly static […]

What if we become a bit more positive in the ...


Malwarebytes teamed up with Osterman Research to take an in-depth look at the underlying costs of fighting cybercrime across 900+ organizations globally. To gain a deeper understanding of the insights illuminated by this research, Brilliance Security Magazine spoke with Adam Kujawa, Director of Malwarebytes Intelligence. Adam explained that for the first […]

The Underlying Costs of Fighting Cybercrime