Listen to the article Data breaches and a demand for stricter security measures are inspiring companies to invest in obtaining a System and Organizational Controls (SOC) 2 report. Without one, businesses can lose deals or fail audits. Companies that work with a SOC 2 consulting partner improve their funding and […]

How to Select SOC 2 Consultants: A Decision Framework for ...


Listen to the article In an era where cyber risks evolve as quickly as technology itself, alignment among technology leaders — including chief information officers (CIOs), chief technology officers (CTOs) and chief information security officers (CISOs) — has become a strategic necessity. When these leaders share a unified vision for […]

Are Your Tech Leaders Aligned on Your Security Strategy?


Healthcare networks hold some of the most sensitive information. Patient records, medical devices and clinical applications are a pot of gold for hackers. Any gap in defenses can result in serious risks to patient safety and data privacy. A zero-trust security model can help protect personal information, allowing the hospital […]

How to Adapt Zero Trust for Hospitals



Episode summary Private credit is often described as direct, collateral-based lending outside traditional banks—and it’s increasingly central to how real estate investors and operating businesses access capital. But as the market has accelerated, many of the underlying controls haven’t kept pace. In Episode S8E1 of the Brilliance Security Magazine Podcast, […]

Replacing Trust with Truth: Private Credit Fraud, UCC Visibility, and ...


A new all-in-one gas detection device and advanced connected safety platform for the data-driven worksite Calgary, Canada, January 13, 2026 — Blackline Safety Corp. (TSX: BLN), a global leader in connected safety technology, has announced G8, the next evolution of worksite safety and the most connected wearable the company has […]

Blackline Safety Introduces G8 — The Most Connected Safety Wearable ...


In a lineup of over a dozen listed industries, Banking led the way in the recent Thales 2025 Consumer Digital Trust Index report. With 44% stating that they trust Banking “the most when it comes to sharing [their] personal information,” it becomes evident that the sector is doing something right. […]

What Business Leaders Can Learn from Banking’s Trust Leadership



Artificial intelligence is rapidly impacting health care, powering medical devices that can diagnose conditions and monitor patients in real time. However, along with these promising benefits come risks unique to these new gadgets and networks. Technicians and health care organizations must understand these four common challenges and prioritize security for […]

4 Challenges of Securing AI-Enabled Medical Devices


The University of Phoenix has disclosed a data breach affecting nearly 3.5 million people, a reminder that when core enterprise platforms get hit, the fallout extends well beyond a single department or system. In this case, attackers exploited a critical, then-unknown vulnerability in Oracle E-Business Suite (EBS), accessed sensitive records, […]

University of Phoenix Discloses 3.5M-Record Data Breach Linked to Oracle ...


Access risk is an invisible liability that never shows up on balance sheets, shipping schedules, or vendor scorecards. It silently builds up through unmanaged accounts and unmonitored logins, stalling operations, straining supply chains, and eroding the trust that businesses depend on. Identity and access management (IAM) is intended to reduce […]

The Silent Risk in Your Supply Chain – Excess Access ...



Human resources sits close to the center of most organizations’ trust networks. Very few teams touch as much sensitive material with as little friction. Social engineers view that position as leverage, which has led to a rise in attacks aimed at HR functions. Here’s how deceptive actors favor human fallibility […]

How Social Engineers Use the HR Department as an Attack ...


In Episode S7E23 of the Brilliance Security Magazine Podcast, host Steven Bowcut sits down with Linda Calvin, the new Dean of the School of Technology at Western Governors University (WGU). Since stepping into the role in September, Linda has brought her deep experience in technology education, workforce development, and community […]

Reimagining Cybersecurity Education with WGU’s Linda Calvin


Organizations opt for multiple cloud platforms primarily for flexibility and resilience. They distribute workloads across different providers and avoid vendor lock-in. However, the more a company uses best-of-breed services for each need, the wider the attack surface becomes. How should IT teams balance these challenges while continuing to reap the […]

How to Improve Network Security for Multicloud Environments