Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

SolarWinds CEO Blames Intern for 'SolarWinds123' Password Leak Scandal! || Razorthorn Security

Dive deep into the SolarWinds scandal as the former CEO points fingers at an intern for the notorious 'SolarWinds123' password leak! Uncover the critical lapse in password security that lingered undiagnosed for years. In 2019, an independent security researcher stumbled upon 'SolarWinds123' exposed on the public internet, leading to a stern warning to the company about the vulnerable file server.

SEC Allegations: SolarWinds CISO Aware of Cyber Risks Who Should Fix Vulnerabilities? #podcast

Welcome to our latest video where we unpack the recent SEC allegations surrounding SolarWinds CISO's awareness of cybersecurity risks and vulnerabilities. The SEC claims that despite this awareness, the issues were not adequately addressed. Join us as we delve into the critical question: Is the CISO now responsible for fixing vulnerabilities?

AI Reality Check: Navigating High False Positives Today | Proceed with Caution | Razorthorn Security

In this eye-opening video, we dive deep into the current state of AI, shedding light on a significant challenge it grapples with - a high false positive rate. While optimism is warranted for the future, I candidly express my belief that we are still a number of years away from achieving true production readiness.

SolarWinds' CISO Under SEC Scrutiny: The Impact On The Infosec Community || Razorthorn Security

Welcome to Razorwire, the podcast where we cut through the noise to bring you incisive discussions on all things cybersecurity. I'm your host, Jim, and in today's episode, we delve into the SEC charges against SolarWinds CISO, a case that has sent shockwaves through the infosec community. In this episode, our guests Iain Pye and Chris Dawson discuss the hype surrounding the trial and its impact on the infosec community and the potential consequences for all Chief Information Security Officers (CISOs). We also explore the uncertainties surrounding the CISO's responsibilities and actions within the organisation regarding addressing security vulnerabilities, as well as the potential implications of the SEC ruling on CISOs' risk aversion and self interest. Lastly, we talk about the dynamics of security compliance certifications and the potential manipulation involved in obtaining them. If you're a cybersecurity professional, join us as we dissect the complexities of CISO responsibilities, the SEC's pursuit of individuals over organisations and the implications of legal actions on the infosec landscape. Tune in for an insightful discussion that will challenge your perspectives and keep you on the cutting-edge of cybersecurity issues.

Decoding the SEO Dilemma: Exploring the Divide on AI's Role in Production Environments #podcast

Dive into the heart of the SEO dilemma with me as we unravel the intriguing discussions surrounding the use of AI, particularly in production environments. In this video, I explore the current sentiments and general consensus among CX leaders, shedding light on the varied perspectives within the SEO community. SEO and the AI Frontier: Curious about what the CESOs have been saying? Join me as I dissect the thoughts and opinions circulating within the industry. It's a dynamic landscape with diverse viewpoints on the role of AI, especially in shaping the future workforce.

Boosting Creativity: Unleashing the Power of AI in Marketing and Content Creation #podcast

Embark on a journey with me as I unveil the game-changing tool that has become an integral part of my daily routine. For the past three to four months, I've been leveraging AI to supercharge my marketing efforts as a one-man band. The tool has evolved into a powerhouse, transforming my messaging, features, and benefits into compelling content across various platforms.

Securing the Basics: Adapting Information Security Programs to Evolving Threats #CyberSecurity

In this insightful video, we delve into the dynamic world of Information Security Programs and the constant evolution they undergo. As digital threats continue to advance, these programs inch themselves up, adapting to the ever-changing landscape. Understanding why Information Security Programs change is crucial in today's interconnected world. As threats become more sophisticated, it's essential to stay one step ahead. This video breaks down the key elements of these programs and how they adjust to address emerging challenges.

Unveiling Jedi: Navigating the Power and Pitfalls with Critical Baggage || Razorthorn Security

In the realm of using Jedi, there's a crucial aspect to consider – the level of critical baggage required for effective utilization. It's not just about diving in; it's about understanding the nuances and not blindly trusting the results. This is a pitfall in the industry, where some see Jedi tools as a way to be blissfully ignorant of the facts they query. Many trust it implicitly, assuming that with the power of Jedi, the answers must be indisputable. However, it's essential to recognize that the responses are a foundation, a starting point that demands further exploration.

Unlocking Deep Thought: Navigating the Art of Asking for the Right Answers || Razorthorn Security

Ever felt like you're channeling your inner Deep Thought from Hitchhiker's Guide when seeking answers? Join me on a journey where we explore the art of asking the right questions. It's not just about syntax; it's about unlocking the profound. In this video, I delve into my experiences, including trying out tools like Dary with mixed results. Discover the importance of framing your queries and uncovering the true question behind what you seek.

Unveiling the Chaos: Navigating the Security Nightmare in Modern DevOps and CI/CD Environments

Dive deep into the tumultuous world of modern software development in our latest video, where we unravel the complexities and security pitfalls of CI/CD, DevOps, and DevSecOps. Many believe they've fortified their tools, boasting secure Ansible, Jira, and Jenkins, only to find their GitHub wide open. Join us as we dissect the challenges of transitioning from the development environments of the past to the cloud-centric landscapes of today.