Cybersecurity


Security technology has not kept up with today’s accelerated move toward virtual infrastructure and disappearing network boundaries. Advanced hackers are quickly exploiting application vulnerabilities with fileless and memory-based attacks. A new security approach is needed to counter these sophisticated threats. Methods that do more than monitor the perimeter and that […]

Advanced Application Attacks Put Businesses at Risk


Despite notable investments in Privileged Access Management (PAM) technologies, privileged accounts are still overexposed. Historically, PAM providers have focused on controlling access to accounts and their passwords, not on the activities an administrator needs to perform. The result is an excess of privileged accounts and privileged access control groups with […]

A Task-Based Approach to Privileged Access Management


The use of encryption to protect against cyber threats is growing exponentially. Unfortunately, cybercriminals also leverage encryption to hide malware, ransomware, and other attacks.  Industry analyst firm Omdia estimates that as much as 70–80% of enterprise inbound network traffic is now encrypted, which is up approximately 20% from three years ago. As […]

Analyzing Encrypted Network Traffic



The Department of Defense (DoD) is taking new measures to increase IT security. To protect against cybercrime from all sources, the DoD has worked on a new standard for its contractors. The result is the Cybersecurity Maturity Model Certification (CMMC). The government’s made an effort to improve national cybersecurity for some […]

DoD Implements Cybersecurity Regulation to Protect Against Data Breaches





As part of our efforts to bring our readers the most exciting and innovative technologies to be found at RSAC 2020, Brilliance Security Magazine sat down with SIRP to discuss their compelling new SOAR solution. SIRP is a Risk-based Security Orchestration, Automation, and Response (SOAR) platform that fuses essential cybersecurity information to […]

Risk-based SOAR



Yesterday, DivvyCloud, a leading provider of security and compliance automation for cloud and container environments, released its 2020 Cloud Misconfigurations Report. Today, the most circulated security news story is about the personal data of more than 10 million people exposed in a breach of MGM’s cloud servers. The MGM hack […]

Breaches Caused by Cloud Misconfigurations on the Rise



According to a recent study entitled, “State Of Enterprise IoT Security In North America: Unmanaged And Unsecured” commissioned by Armis: 69% of enterprises have more IoT devices on their networks than computers 84% of security professionals believe IoT devices are more vulnerable than computers 67% of enterprises have experienced an […]

Physical Security System Cyber Protection: An Interview with Johnson Controls


Cybersecurity is at the forefront of discussion for businesses attempting to protect themselves from an array of risks. As attackers develop more sophisticated techniques to bypass defensive measures, companies must take action and increase the level of computer security they have in place. It starts by implementing necessary security precautions […]

Using Machine Learning to Evaluate Cybersecurity Risks


Cyberattacks are becoming easier to carry out and will threaten the digital economy unless businesses innovate Cybercriminal activity is one of the biggest challenges that humanity will face in the next two decades. That’s a bold statement, but not without warrant. Cybercrime represents one of the fastest-growing categories of crime in […]

Cybersecurity 2020: Innovate or Surrender