Cybersecurity


Listen to the article Data breaches and a demand for stricter security measures are inspiring companies to invest in obtaining a System and Organizational Controls (SOC) 2 report. Without one, businesses can lose deals or fail audits. Companies that work with a SOC 2 consulting partner improve their funding and […]

How to Select SOC 2 Consultants: A Decision Framework for ...


Listen to the article In an era where cyber risks evolve as quickly as technology itself, alignment among technology leaders — including chief information officers (CIOs), chief technology officers (CTOs) and chief information security officers (CISOs) — has become a strategic necessity. When these leaders share a unified vision for […]

Are Your Tech Leaders Aligned on Your Security Strategy?




Episode summary Private credit is often described as direct, collateral-based lending outside traditional banks—and it’s increasingly central to how real estate investors and operating businesses access capital. But as the market has accelerated, many of the underlying controls haven’t kept pace. In Episode S8E1 of the Brilliance Security Magazine Podcast, […]

Replacing Trust with Truth: Private Credit Fraud, UCC Visibility, and ...


In a lineup of over a dozen listed industries, Banking led the way in the recent Thales 2025 Consumer Digital Trust Index report. With 44% stating that they trust Banking “the most when it comes to sharing [their] personal information,” it becomes evident that the sector is doing something right. […]

What Business Leaders Can Learn from Banking’s Trust Leadership


Artificial intelligence is rapidly impacting health care, powering medical devices that can diagnose conditions and monitor patients in real time. However, along with these promising benefits come risks unique to these new gadgets and networks. Technicians and health care organizations must understand these four common challenges and prioritize security for […]

4 Challenges of Securing AI-Enabled Medical Devices



The University of Phoenix has disclosed a data breach affecting nearly 3.5 million people, a reminder that when core enterprise platforms get hit, the fallout extends well beyond a single department or system. In this case, attackers exploited a critical, then-unknown vulnerability in Oracle E-Business Suite (EBS), accessed sensitive records, […]

University of Phoenix Discloses 3.5M-Record Data Breach Linked to Oracle ...


Access risk is an invisible liability that never shows up on balance sheets, shipping schedules, or vendor scorecards. It silently builds up through unmanaged accounts and unmonitored logins, stalling operations, straining supply chains, and eroding the trust that businesses depend on. Identity and access management (IAM) is intended to reduce […]

The Silent Risk in Your Supply Chain – Excess Access ...




In Episode S7E23 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Linda Calvin, the new Dean of the School of Technology at Western Governors University (WGU). Since stepping into the role in September, Linda has brought her deep experience in technology education, workforce development, and community […]

Reimagining Cybersecurity Education with WGU’s Linda Calvin


Organizations opt for multiple cloud platforms primarily for flexibility and resilience. They distribute workloads across different providers and avoid vendor lock-in. However, the more a company uses best-of-breed services for each need, the wider the attack surface becomes. How should IT teams balance these challenges while continuing to reap the […]

How to Improve Network Security for Multicloud Environments


IT professionals, cybersecurity analysts and industrial technicians all have a commonality — a desire to protect critical infrastructure. Utilities like HVAC systems are among the most critical for smooth operations, but they also open numerous backdoors for cyber threats. For some companies, HVAC technology cybersecurity is their biggest oversight in […]

Is Your HVAC System Your Facility’s Biggest Security Blind Spot?