Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

November 2023

Unveiling the Chaos: Navigating the Security Nightmare in Modern DevOps and CI/CD Environments

Dive deep into the tumultuous world of modern software development in our latest video, where we unravel the complexities and security pitfalls of CI/CD, DevOps, and DevSecOps. Many believe they've fortified their tools, boasting secure Ansible, Jira, and Jenkins, only to find their GitHub wide open. Join us as we dissect the challenges of transitioning from the development environments of the past to the cloud-centric landscapes of today.

Securing the Weakest Link: A Guide to Third Party Cyber Resilience

We live in a business world where vast amounts of our critical services are delivered to us as a service. The world of on premise solutions has all but disappeared – sure, there are still some systems that operate on premise but these days, more key services are delivered to users and organisations as a service solution. This has increased profitability, allowed small companies to gain access to software and systems that previously were out of reach and has dealt a significant blow to piracy.

Amazon's AI Gold Rush: Profits vs. Consequences - Tackling the Hidden Costs for a Sustainable Future

Dive deep into the heart of the AI Gold Rush in our latest video as we unravel the complexities of an industry where profits are soaring, but at what cost? Andre Harwitz sheds light on a staggering revelation: a whopping 80% of generative AI startup investments are channeled into compute costs, with a single GPT 3.5 training run reaching an astounding $3.8 million.

AI Integration Dilemma: Cost Challenges for Small Businesses vs. Power Play of Tech Giants #podcast

In this insightful video, we delve into the complex landscape of AI integration and its potential cost barriers for smaller organizations. The good news? When it comes to chatbots (CHT), leveraging data access APIs and seamless integration doesn't necessarily mean breaking the bank on AI engine costs. You pay for what matters – the data journey to their APIs.

Embracing the AI Revolution: Navigating Concerns, Regulations, and the Road to Singularity #podcast

Dive into the complex world of AI as we confront the negative comments and fears surrounding its advancement. Join the conversation on the need for increased regulation in the tech sphere and the potential consequences when technology falls into the wrong hands. Are we headed toward a Terminator-like future, or can we find a balance between innovation and ethical use?

Unveiling the Paradox: Why Banks Still Get Robbed Despite Centuries of Security Measures

Dive into the intriguing world of bank security in my latest video, where we unravel the paradox that despite centuries of stringent security measures, banks are still vulnerable to robberies. From high-tech vaults and surveillance cameras to dye packs and a myriad of controls, the list seems endless. Yet, the reality is that banks continue to face security breaches.

Decoding Generative AI: Myths, Realities and Cybersecurity Insights || Razorthorn Security

In the latest episode of the Razorwire podcast, I am delighted to welcome back our esteemed cybersecurity professionals, Oliver Rochford and Richard Cassidy. Today, we delve into the fascinating realm of generative AI and its applications in the cybersecurity landscape.

Navigating Cybersecurity Challenges: Budget Constraints, Team Dynamics, and Decision-Making Dilemmas

cybersecurity professionals face when faced by cybersecurity professionals when it comes to addressing vulnerabilities. Often constrained by limited budgets and resources, the decision-making process regarding specific vulnerabilities lies in the hands of various stakeholders within the business.

Beyond PCI! Decoding the Essentials of Compliance Standards | ISO 27k and More | Razorthorn Security

Dive deep into the intricate world of compliance standards with our latest video, where we dissect the common misconception that a single standard, such as ISO 27k, is the be-all and end-all. In this eye-opening exploration, we debunk the myth that meeting PCI compliance requirements is the finish line. Discover why these standards are merely the foundation, not the complete story. Many find themselves entangled, thinking, "If I'm PCI Compliant, I'm done." Hold on – that's just the beginning!

Revolutionizing Work: The Evolution of Technology and its Impact on Jobs and Opportunities #podcast

In this insightful video, we delve into the fascinating journey of technological evolution and its profound impact on the way we work. From the days of pools of typists diligently typing away to the transformative era of computing, witness the incredible shift that has shaped our work landscape.

Mastering Security: Navigating Protective Detective, and Corrective Controls with Compliance Harmony

Dive deep into the world of cybersecurity with our latest video, "Mastering Security: Navigating Protective, Detective, and Corrective Controls with Compliance Harmony." In this insightful exploration, we demystify the roles of protective, detective, and corrective controls, highlighting their crucial functions in maintaining a robust control environment.

SEO Challenges: Tool Thefts, Short Lifespan, and Implementation Struggles || Razorthorn Security

Description: In the ever-evolving landscape of SEO, the operation is no longer as simple as it once was. It goes beyond just worrying about your own digital "house"; now, you must also consider the connected houses in the vast online neighborhood. Tool thefts add another layer of complexity to the SEO game, requiring constant vigilance to safeguard your digital toolkit.

Driving Change: Updating Defence in Depth for 2023 and Beyond

Here we are, at the end of 2023. It’s high time for updating defence in depth strategies across all organisations, and let me tell you why. We’re all aware of the uptick in high profile cyber attacks and compromises, across all sectors. Ransomware specifically has caused more economic loss and pain for the business world than any other information security event previously, and attacks are speeding up at a steady rate with larger and larger targets and ransoms being asked.

CISOs in the Spotlight: Lessons from the SolarWinds SEC Action

Unless you have been hiding under a rock the last few weeks, you will know about the SEC taking action against the SolarWinds CISO in a landmark case that is going to change the way CISOs undertake their jobs in the future. The SEC’s action against the SolarWinds CISO is a wakeup call for all CISOs.

Unleashing the Power of Technology: How AI is the Next Big Leap! || Razorthorn Security

In an ever-evolving world of technology, we often witness the remarkable phenomenon of exponential growth in power and capability. Join us as we explore this fascinating journey of technological advancement, from the skeptics who doubted the significance of email to the In an ever-evolving world of technology, we often witness the remarkable phenomenon of exponential growth in power and capability. Join us as we explore this fascinating journey of technological advancement, from the skeptics who doubted the significance of email to the unstoppable rise of AI.

Tech Evolution: From Typists to Email - A Transformative Journey || Razorthorn Security

Explore the captivating journey of technological evolution in our latest video, where we draw intriguing parallels between the past and present. Our technological progress is often a reflection of the enduring patterns of innovation in history. Once upon a time, office spaces were abuzz with typists meticulously transcribing letters and documents onto paper, catering to the needs of companies and their customers.

Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall || Razorthorn Security

Hello and welcome to Razorwire, the podcast where we delve into the world of cybersecurity with top experts and industry leaders. I'm your host, James Rees, and I can't wait to share this episode with you. As a PCI DSS QSA, I’m delighted to have PCI expert Jeff Hall as my guest today. This episode will give you a unique perspective on how security has evolved from early mainframe days to today's interconnected, risk-focused practices. Jeff tells us about his hard-won lessons and wisdom gathered over decades steering information security programmes including the need for compliance to work alongside overall security and not hinder it, and why auditors should be viewed as allies, not adversaries.

Balancing Ethics and Freedom: The Challenge of Regulating Public Access to Advanced AI like Chat GPT

In an era of rapid technological advancement, the availability of AI systems like Chat GPT to the public raises complex questions about ethics and limitations. Join us as we dive into the challenging debate surrounding the responsible use of this cutting-edge technology. 🤖⚖️ In this thought-provoking video, we explore the need for some rules to prevent the harmful use of AI while respecting the values of free expression. We will examine the difficult task of defining the ethical boundaries of AI systems and the impact of these decisions on our online conversations.

Microsoft's AI Experiment Gone Wrong: The Rise and Fall of 'Emily' - From Innovation to Controversy

In this eye-opening video, we delve into the intriguing story of Microsoft's AI experiment, affectionately known as 'Emily,' and its transformation from an innovative creation to a controversial internet sensation. Just a few years ago, Microsoft introduced 'Emily' to the world, a cutting-edge AI designed to interact with and learn from internet users. However, the results were far from what anyone expected.

Unlock the Power of Quality Data in AI: Data Cleaning for Enhanced Accuracy and Output

In the fast-paced world of AI, data quality is paramount. To harness the full potential of your AI models, you need top-notch data. This means not just grabbing web pages with all the HTML, CSS, and JavaScript source code intact. Instead, you'll want to strip away the extraneous and retain only the critical information that's essential for training your AI. Leaving unnecessary code in the mix can have a detrimental impact, affecting both accuracy and the quality of the AI's output.