In Episode S7E21 of the Brilliance Security Magazine Podcast, host Steven Bowcut speaks with Dr. Masoud Nafey, Founder of Ment, an AI-driven relationship intelligence platform built on a foundation of privacy and authenticity. Together, they explore how artificial intelligence can help professionals build and nurture meaningful relationships without compromising personal […]

AI, Privacy, and the Future of Human Connection


Users often view passwords as a nuisance, and creating them feels like a waste of time. Because of this mindset, security and best practices are not being used to create different, protective passwords for accounts. There is psychology behind this phenomenon, as well as some tips to keep in mind […]

Password Psychology: Why Do People Still Use Weak Passwords?


A new study from Ontario Tech University, PureSquare, and CQR Cybersecurity is shedding light on a paradox at the heart of modern personal cybersecurity: consumers are spending more time and money than ever managing multiple security tools—yet are often less secure as a result. The research, titled “The Cost of […]

Security Tool Overload: How Fragmentation Makes Users Less Safe



Manufacturing ransomware attacks can severely limit operations, taking all systems offline or making critical data inaccessible. Because these threats have become more prominent, many decision-makers prioritize cybersecurity for manufacturers, knowing their lack of attention could have significant and lasting consequences. Why have cybercriminals focused on this group of potential targets?  […]

Why Are More Ransomware Attacks Targeting Manufacturers?


With growing global risks threatening cybersecurity, third-party risk management (TPRM) is critical. Businesses outsource to vendors to improve data security, but due to an increasingly digitized world, third parties may also pose a significant risk to security. To ensure safe TPRM practices, it is essential to understand the red flags […]

Are Your Security Vendors a Ticking Time Bomb? A Guide ...


Deepfakes pose a significant challenge for crisis communication teams. In the time it takes to issue a response, a fake video, image or sound clip can spread disinformation, damage reputations and erode trust. For those in security and communications, the question is not if this will happen, but how ready […]

Protecting Crisis Communications From AI Deepfake Attacks



The browser has quietly become the most critical—and most overlooked—attack surface in cybersecurity. In Episode S7E20 of the Brilliance Security Magazine Podcast, host Steven Bowcut talks with John Carse, Field CISO at SquareX, about the company’s groundbreaking Browser Detection and Response (BDR) technology and why legacy tools like EDR and […]

The Browser Blind Spot: Rethinking Enterprise Security


Reconstruction attacks happen when someone uses output from a system, like a trained model, a summary report or a public dataset, to rebuild the private data behind it. Even if names are removed, patterns will remain. An attacker stitches those clues together to reveal sensitive information about an individual or […]

How to Defend Against Reconstruction Attacks


Ridge Security has once again pushed the boundaries of offensive security innovation with the launch of RidgeGen, an agentic AI framework that elevates automated testing into true autonomous security validation. Announced from the company’s headquarters in Milpitas, California, RidgeGen represents the next major evolution of Ridge Security’s flagship product, RidgeBot, […]

From Automation to Autonomy: Ridge Security Unveils RidgeGen AI Framework



In Episode S7E19 of the Brilliance Security Magazine Podcast, host Steven Bowcut speaks with Andrew Warren, Vice President of Sales and Marketing at Exclusive Networks North America. With nearly 20 years of experience in the cybersecurity channel and 15 years in distribution, Andrew offers a unique perspective on how the […]

Why Security-Focused Distribution Matters in Today’s Cyber Landscape


Dealing with a loved one’s death is a difficult and vulnerable time. Unfortunately, cybercriminals and fraudsters can exploit this period to manipulate grieving families and benefit from the estate. Understanding the mechanisms behind these attempts can help a deceased person’s family and loved ones protect themselves from cyberattacks. How Attackers […]

Social Engineering the Bereaved: How Attackers Exploit Grief to Compromise ...


Artificial Intelligence is driving rapid innovation across industries—but it’s also creating new risks, uncertainties, and regulatory challenges. How can enterprises adopt AI with confidence, ensuring it remains safe, compliant, and trustworthy? On Episode S7E18 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Mark Stadtmueller, Chief Technology […]

AI Governance: Balancing Innovation, Compliance, and Trust