Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Navigating the AI Landscape: The Urgent Call for Transparent Martial Law | Razorthorn Security

Embark on a critical discussion with me as we dissect the current state of AI legislation, shining a spotlight on the ambiguity surrounding military applications. In this video, I emphasize the pressing need for transparent frameworks and controls in the military AI sector, mirroring the advancements seen in commercial and medical domains. It's a call to action for industries, governments, and users worldwide to unite in pushing for robust controls and accountability. The risk is real, and it's time to prioritize ethical considerations in military AI.

AI's Quantum Leap: 5 Billion Times More Powerful in a Decade! Impact on Jobs and Innovation Now

Join me as we delve into the astounding progress of today's cutting-edge AI systems, now boasting a staggering five billion times more power than a mere decade ago! In this video, we scrutinize the accelerated pace of innovation in AI, sparking a crucial conversation about the looming advent of AGI. While I'm hopeful for a later arrival of AGI, the reality might unfold sooner than expected. Let's explore the hypotheticals and the tangible impact on the employment industry in the present moment.

Snyk and ServiceNow

Looking for a complete view of your application security posture to drive smarter, faster fixes in your ServiceNow workflows? ServiceNow workflows, backed by Snyk, provide a single view into all application vulnerabilities from multiple sources, determine their priority, and help expedite the remediation process with relevant stakeholders across the organization to reduce the attack surface. Working together with AppSec and IT teams, learn how SecOps teams can track vulnerabilities in open source dependencies and create ServiceNow Application Vulnerable Items (AVITs) automatically.

The Hidden Costs of AI: Disruptions, Frauds, Job Loss, and the Looming Wage Depression

Embark on an in-depth exploration of the unintended consequences of AI in this eye-opening video From the rise of scams during the holiday season fueled by deceptive AI-generated product ads to the emotional toll on people with sudden digital relationships, we explore the disruptive side of artificial intelligence.

Optimizing Returns from Your Cyber Risk Program

In today’s economic environment, nearly every department in every organization across the globe is being challenged to do more with less. Meanwhile, digital footprints continue to grow and sprawl and cyber attackers look to take advantage of vulnerable infrastructure. Organizations need to assess how they can be more resourceful as they look to maintain a best-in-class cyber risk program and continue to meet business expectations.

Unlock the Power of Attack Surface Management with Insights from a KuppingerCole Analyst

Join Vanessa Jankowski, SVP of Third Party Risk Management, and Greg Keshian, SVP of Security Performance Management, as they explore key findings from the 2023 KuppingerCole Leadership Compass Report for Attack Surface Management with John Tolbert, Director of Cybersecurity at KuppingerCole Analysts. In today's interconnected digital landscape, managing your exposure strategy for your infrastructure and your supply chain is paramount. They discuss strategies to fortify cybersecurity defenses and minimize risks.

Identifying Blind Spots Through External Attack Surface Management

Did you know that 69% of organizations have experienced some type of cyber attack in which the attack itself started through the exploit of an unknown, unmanaged, or poorly managed internet-facing asset? Understanding the scope of your organization’s external attack surface is essential. You need to continuously manage your digital footprint to know where risks exist and how to prioritize vulnerable areas. Gain visibility into what an attacker sees and take informed action to reduce exposure and empower your organization’s growth and success.