In Episode S7E15 of the Brilliance Security Magazine Podcast, we sit down with Abhay Bhargav, co-founder of SecurityReviewAI and CEO of we45. Abhay shares his journey in application security and explains how SecurityReviewAI is transforming the traditional, months-long process of security architecture reviews into fast, actionable insights. We explore how […]

Reinventing Security Architecture Reviews


SACRAMENTO, Calif., — August 27, 2025 —Rhombus, a leader in cloud-managed physical security, today announced the launch of four new security cameras purpose-built to meet the evolving safety demands of modern businesses. From expansive campuses and facilities to tight, sensitive spaces, these new additions to the Rhombus portfolio give security and operations […]

Rhombus Launches Four New Security Cameras for Situational Awareness and Long-Range ...


In-memory attacks are silently effective and unusually hard to spot. Because they leave little trace and ride on trusted processes, they can easily bypass antivirus tools and move laterally at alarming speed. Unfortunately, this can result in anything from breached customer records to disrupted operations. Understanding how these attacks behave […]

How to Defend Against In-Memory Cyberattacks



Artificial intelligence (AI) is becoming basic tables stakes for nearly any organization. Whether a software company embeds it into their product or a website uses it to answer questions, AI agents are changing the world.  In a May 2025 survey, 75% of senior executives agreed or strongly agreed that AI […]

AI Agent Ownership – An Underlying NIST AI Risk Management ...


With data breaches and similar incidents on the rise, today’s chief information security officers often become interested in Development, Security and Operations (DevSecOps), knowing it can help them smoothly integrate secure practices into the software development process. Then, they can move from the conventional gatekeeping-based approach to one that enables […]

The CISO’s Guide to DevSecOps: Moving Security From Gatekeeper to ...


When a breach hits, it’s not the checklist that fails first. It’s the people. Humans are naturally wired to a fight-or-flight mechanism, but sometimes, this survival response hinders progressive action in solving the issue. Security teams often build incident response (IR) playbooks assuming ideal conditions — tools are online, team […]

Rethinking Incident Response: Why Your Plan Fails When People Panic



Effective cybersecurity covers more than just technical defenses. The human element plays a massive role in an organization’s security posture, but many fail to address it properly. All too many businesses focus on increasing awareness without recognizing the need for cybersecurity behavior change. Why Is Cybersecurity Behavior Change Necessary? Human-centric […]

How to Drive Cybersecurity Behavior Change


In S7E14 of the Brilliance Security Magazine Podcast, we welcome Alex Brennan, Vice President of Global Enterprise Sales at Sign In Solutions, to explore the emerging role of visitor management in modern physical security strategies. In this episode, titled “Securing the Front Door: How Visitor Management Became a Security Imperative,” […]

Securing the Front Door: How Visitor Management Became a Security ...




As artificial intelligence becomes more sophisticated, so too do the tools used by cybercriminals. One of the most alarming developments in recent years is the rise of AI-enhanced social engineering—a fusion of psychological manipulation and machine learning that poses a serious threat to individuals and small businesses alike. In this, […]

Understanding AI-Enhanced Social Engineering


Drug counterfeiting in the pharmaceutical industry has been a problem for centuries. Experts have designed policies and technologies to fight against it over the years, though they are not foolproof. Virtual attacks threaten drug and customer data, making cybersecurity more crucial than ever in fighting counterfeiting efforts. These are the […]

The Role of Cybersecurity in Combating Drug Counterfeiting


While compliance frameworks such as CMMC, NIST 800-171, and DFARS 7012 lay the groundwork for baseline cybersecurity posture, they do not explicitly mandate controls around email authentication protocols like DMARC, DKIM, and SPF. However, these controls are vital for brand protection, domain ownership, and customer trust—extending well beyond the boundaries […]

Strengthening Email Security with DMARC, DKIM, and SPF: A Strategic ...