Welcome to Episode S5E14 of the BSM Podcast that you definitely don’t want to miss! We’re thrilled to have had the privilege of hosting Bryan Grenon, Director of Critical Infrastructure for ADT Commercial’s Enterprise Security Risk Group, and Chris Fowler, Director of Emerging Technologies at ADT Commercial, on our show. […]

Physical Safety in the Workplace


By Marco Ayala, Industrial Automation and Control System (IACS) Cybersecurity Sector Lead at 1898 & Co. In April of 2023, OPEC’s surprise oil production cuts left the Biden Administration sitting with a huge, missed opportunity to refill 180 million barrels of the Strategic Petroleum Reserve. Oil has become a sacred […]

Less Reliance on Foreign Oil Begs the Importance of Domestic ...


Welcome to the thrilling Episode S5E13 of the Brilliance Security Magazine Podcast, where we take a deep dive into the world of technological innovation in security. In this episode, our host Steven Bowcut sits down with a true pioneer in the field—Dr. Maria Bell, the visionary Founder and CEO of […]

Technical Innovations Designed to Reduce Active Shooter Response Times



First, Polymorphic, Intelligent, Fully Autonomous AI Malware is the Shape of Future Threats Adversarial infrastructure detectors and thwarters at HYAS Infosec have produced a prototype of future AI-enabled threats. Its EyeSpy proof-of-concept (PoC) is an entirely new type of polymorphic, fully autonomous malware that employs AI to make informed decisions and synthesize its capabilities […]

HYAS Foresees Future Havoc to Help Thwart It With “EyeSpy” ...


Advanced API Security Solution Pioneers an Adaptive Approach to Combat Digital Fraud and API Abuse Traceable AI, the industry’s leading API security company, today announced the launch of its digital fraud prevention capabilities, to deliver protection against fraudulent activities across APIs and digital interfaces. This innovation is crucial, especially in […]

Traceable AI Introduces Revolutionary Digital Fraud Prevention


Welcome to a captivating new episode of the Brilliance Security Magazine Podcast. In this latest installment, our host Steven Bowcut has an enlightening conversation with cybersecurity expert, Melvin Ejiogu, the CEO and President of VeeMost Technologies. They embark on a deep dive into the ever-evolving world of cybersecurity, particularly focusing […]

Cybersecurity in the AI Era: Combating Modern Threats



Senhasegura, a leading provider of Privileged Access Management (PAM) solutions, has taken a significant step in enhancing its global reach and commitment to customer service with the inauguration of its newest Center of Excellence (CoE) in Austin, TX. This facility will cater to the rapidly growing network of North American […]

Senhasegura Expands its Global Presence with the Opening of the ...


Over recent years, rates of reported phishing attacks have skyrocketed. The dark web is making it easier than ever for hackers to learn about and conduct these attacks. The Dark Web: A Gateway for New Hackers The dark web is where many amateur hackers learn to create and launch cyber […]

How the Dark Web Fuels Phishing


Jen Easterly, Camille Stewart Gloster, Marcus J. Carey to Keynote Too many attend the large technology conferences and feel like they don’t belong. Girls Hack Village aims to fix that with SquadCon, a new independent three-day cybersecurity conference that will be held in Las Vegas during Hacker Summer Camp, August […]

Girls Hack Village Presents SquadCon- 3-Day Conference During Hacker Summer ...



By Anastasios Arampatzis The frequency of cyberattacks on operational technology (OT) systems is increasing, causing significant impact on industrial operations. Organizations are under pressure to find solutions quickly. Industry 4.0 prompted the adoption of digital solutions that aim to increase automation, incorporate smart devices, improve data efficiency, and IT-OT convergence. […]

IT and OT in the Mix: Spotting New Threats in ...


By Zachary Amos, Features Editor at ReHack Active defense in cybersecurity takes an aggressive stance to deliberately thwart attackers. It’s akin to setting mouse traps rather than just putting out deterrents in hopes the pests stay away. In active cyber defense, cybersecurity teams purposely mislead, annoy or even attack hackers, beating […]

How to Implement Active Defense in Cybersecurity


By Devin Partida, Editor-in-Chief, ReHack.com There are plenty of fish in the sea, but some of them are hardly worth catching. Why are some employees bombarded with phishing emails while others seem to escape the issue altogether? Here is what hackers look for in a target.  High-Ranking Executives Perhaps unsurprisingly, hackers […]

Which Employees Are Most at Risk of Phishing Attacks?