If phishing still works, so must our training! Understand why cybersecurity training remains vital as attackers continue to exploit predictable human behaviours.
Explore how security awareness has shifted to a holistic approach of human risk management. Learn why changing behaviour, not just spreading awareness, is crucial in today's cyber landscape.
As AI reshapes cybersecurity threats, understanding how scams are evolving has never been more critical. Welcome to Razorwire. I'm Jim, and today I'm talking with Noora Ahmed-Moshe, VP of Strategy and Operations at Hoxhunt. We'll explore how AI is transforming cybersecurity threats and what that means for protecting ourselves and our organisations.
Reflect on the early days of cyber threats with the Love Bug virus. Discover how this simple yet effective attachment-based attack marked a turning point in the evolution of malicious actors.
Are layoffs increasing your cybersecurity risk and driving your team to burnout? This episode looks into the psychological underpinnings of infosec to navigate turbulent times at work.
As outsourcing grows, so do third-party risks. Discover why regular checks and a resilience plan are essential for managing long-term vendor relationships and preventing potential threats.
Discover why third-party relationships carry inherent risks and the importance of ongoing due diligence. Learn how companies often fall short by only conducting initial checks and the impact if a vendor suddenly goes out of business.
Every vendor you trust and every employee you hire could be your next security crisis—explore the realities of third party risk and insider threats on this episode of Razorwire! Join us for a discussion on the multifaceted challenges of third party risk and how they can destabilise your organisation. From the growing complexities of cloud providers like AWS and Azure to detecting and dealing with insider threats, our conversation covers it all.
Despite the potential, Jack Jones argues that most GRC tools fail to understand risk and end up being repositories of irrelevant data. Hear why they don’t hit the mark and what needs to change.
Jack Jones points out that many CISOs know security but not risk. Learn why a lack of understanding of true risks versus security control issues leads to ineffective GRC implementations.