Software reduces false alarms by up to 95% Tampa, Fla. and Ashburn, Va. – April 7, 2022 – SureView Systems, the leading open response platform provider for running security operations, and Calipsa, a market-leading provider of deep-learning powered video analytics for false alarm reduction, today announced the integration of their […]

Calipsa and SureView Integrate False Alarm Reduction with PSIM Platforms


By Ryan Ayers, Researcher and Consultant Chances are pretty good you’ve heard about data breaches in the news. In fact, if you’re like most consumers, you’ve probably even been affected by them in the past. Companies like Yahoo, Facebook, and Marriot, have all had breaches that compromised the information of […]

7 Reasons Why You Should Be Strengthening Your Company’s Cyber ...


By Tom Sego, CEO BlastWave Returning to the office represents a long-awaited milestone, a positive sign that we can engage more fully with colleagues, return to in person events, and move forward with our lives. There are many flavors of what a back-to-office plan looks like, and everyone has an […]

The Many Flavors of Back to Office and Why Companies ...



In my neverending quest to find new, meaningful, and unique security solutions and strategies for the readers of Brilliance Security Magazine to consider, I recently talked with Rajiv Pimplaskar, President & CEO at Dispersive. We discussed Dispersive’s radically different, cloud-native approach to virtual networking, how it works, how it’s different, […]

Multipath VPN for Security and Resiliency



By Emily Newton, Editor-in-Chief at Revolutionized Magazine Internet of Things (IoT) devices are everywhere — and market research suggests they are about to become much more popular.  However, experts are concerned about the potential impact of poor IoT device security. Insecure items could leave businesses and consumers much more vulnerable to […]

How Secure Are IoT Devices and Wearables?



Cynalytica, Inc. announces the delivery of the first SerialGuard® cybersecurity solution to a United States–based S&P 500 gas pipeline operator. Designed for Industrial Control Systems (ICS), SerialGuard is a fully passive serial packet sniffer that enables secure visibility within vulnerable legacy networks. This fail-safe sensor monitors Level 0 and Level […]

Cynalytica Delivers First Deployment of SerialGuard® Cybersecurity Solution for Gas ...


By François Amigorena, Founder and CEO of IS Decisions As global cyber security risks abound, multi-factor authentication (MFA) is one of the most effective ways to protect access and prevent breaches. While MFA has gained momentum over the past two years, it’s still not in widespread use. Why? For MFA […]

What’s Next for MFA


SALT LAKE CITY— Ostrich Cyber-Risk™, a leading Cyber Risk Management Provider, is thrilled to announce the launch of Birdseye, an innovative solution for cyber risk analysis and reporting. A strong cybersecurity posture requires a complete picture of the unique risks facing a given organization. Equally important, security leaders must have […]

Ostrich Cyber-Risk Announces the Release of Birdseye, a Cyber Risk ...



By Ari Mahairas, 2020Partner and Director of Security for SL Green Realty 5G is a hot topic in our digital society but has been met with mixed feelings from businesses and consumers since its conception. One of the biggest questions being thrown around is how 5G affects Internet of Things […]

The Power of 5G: Fortifying the Link Between Physical and ...


By Zachary Amos, Features Editor at ReHack With so many transactions and interactions taking place online, a comprehensive focus on data security is more important than ever. Each time a consumer, client, or patient puts their information into a web form, they need to be assured their data is protected and […]

6 Ways to Tell If a Business Has Good Data ...


In Episode S4E4, we have two guests. We talk with Jonatan Altszul, CEO at BitTrap and Ariel Futoransky, BitTrap’s CTO. Our topic is A Novel Approach to Security Bug Bounties. BitTrap helps companies find breaches faster by installing wallets with risk-adjusted bounties. When an attacker cashes a wallet, they notify […]

A Novel Approach to Security Bug Bounties