Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Vendor-CISO Dynamics: Building Solutions Through Understanding

Explore the critical relationship between vendors and CISOs with Robert Black. He discusses the need for vendors to understand and address the specific problems faced by organisations rather than just selling solutions. This clip highlights how shifting power back to CISOs can lead to more effective cybersecurity strategies.

Understanding Attackers: The Key to Effective Cyber Defence

In this clip, Robert Black emphasises the importance of understanding attackers' decision-making processes. By building networks with the attacker's perspective in mind, organisations can better influence and deter potential threats. Learn why considering the human element in cyber threats is crucial.

Beyond Tech: Shaping Cybersecurity Through Strategic Influence

Robert Black discusses the misconception of cybersecurity as purely a technical issue. He highlights the importance of shaping opinions and strategies, reflecting on the National Cyber Force's cognitive effect strategy. Discover why cybersecurity requires more than just technical expertise.

The Art of Cyber Deception: How To Get Inside The Mind of A Hacker with Rob Black

**Explore Revolutionary Cybersecurity Tactics on Razorwire with Rob Black** Tune in to this week’s episode of Razorwire where host Jim engages with Rob Black, a former military strategist turned cybersecurity innovator. Rob’s extensive experience, from computer game design to defusing IEDs, provides a unique perspective through which we can understand adversary psychology in cybersecurity. For more information or to ask questions, email podcast@razorthorn.com. Visit for personalised cybersecurity consultation.

Understanding Risk in Cybersecurity: Balancing Cost and Protection

Cybersecurity is a game of risk management, balancing the costs of protection against potential losses. This clip emphasises the importance of quantitative risk assessment to set appropriate budgets and limits. Learn why it's crucial to align security spending with the value of assets being protected, and how to avoid overextending resources.

The Rising Costs of Cybersecurity: Budgets and Priorities

In this clip, the discussion focuses on the increasing costs of cybersecurity and the need for dedicated security budgets separate from IT. With certifications becoming more expensive and vendors raising prices, organisations must navigate tight budgets while ensuring robust security measures. Understand the economic pressures and strategies for maintaining effective security.

From Office to Remote: Adapting Endpoint Security Strategies

As remote work becomes the norm, organisations face new challenges in securing devices outside the office. This clip discusses the return to host-based security and the importance of robust endpoint security measures backed by logs and alerts. Learn how to adapt your security strategies for remote environments where device locations are unknown.

Remote Work Security: Trusting Employees and Protecting Data

With the rise of remote work, ensuring that employees are actually working from secure locations is more crucial than ever. This clip discusses the trust issues and risks associated with employees working from unapproved locations, highlighting the need for robust IT asset management and security protocols to protect sensitive data.

Trust and Control in Third-Party Audits: Navigating the Challenges

This clip explores the delicate balance between trust and control in managing third-party vendors. With only large corporations often able to conduct thorough audits, many organisations must rely on paper audits and trust the provided responses. Understand the limitations and strategies for ensuring security when physical audits aren't feasible.

Balancing Trust and Control: Effective Phishing Protection Strategies

Discover why balancing trust and control is essential in cybersecurity. Our hosts discuss the complexities of protecting against phishing attacks, especially with advanced tools like ChatGPT that make scams harder to detect. Learn how combining trust with effective controls can help detect anomalies and safeguard your organisation against targeted attacks.