Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Making cash management smarter with AI-powered insights from Balance - S2E11

In this episode, we're excited to introduce Batu Inal, Co-Founder and CTO of Balance, an intelligent treasury platform revolutionizing how enterprises optimize their cash management. Balance provides real-time visibility into cash across all accounts, AI-powered forecasting, and automated insights to help businesses work their money harder. With $50B+ in transactions processed and $2B+ in accounts monitored, the platform serves established organizations including large enterprise businesses.

Thinking in pipelines for AI agents with David Burkett

Join us for this session of Defender Fridays as we explore thinking in agent pipelines with David Burkett, Cloud Security Researcher at Corelight and Founder of Magonia Research. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Thinking long-term growth in an AI-dominated industry with Stel Valavanis of onShore Networks [302]

Today we're speaking with Stel Valavanis, Founder and Chairman at onShore Networks and Co-Founder at The Gallery Building, about sustaining a security company over three decades of industry changes. We also dive into investing in start ups and how founders can think long term about governance and growth.

Camille Stewart Gloster on how AI systems can help you wade through log data and get more done

AI and machine learning are already being used in cybersecurity to help reduce the "noise of all the indicators" that security teams receive. These systems can serve as a "first line of defense" by setting up potential response actions. However, organizations need to ensure they keep human analysts in the loop because contextual knowledge and human judgment remain critical. Data Security Decoded is available on our YouTube channel!

Server Hardening Tools Explained: Tools, Strategies & Best Practices in 2025 | CalCom Webinar

Baseline server hardening is evolving rapidly. In this webinar, we break down the latest trends in server hardening and tools for 2025. Key Topics Covered Learn how CalCom Hardening Automation Suite (CHS) simplifies the process and saves IT teams hours of manual work.

Why Everyone Must Learn AI Skills in 2026 #shorts #ai

AI skills are no longer optional. The US Department of Labor recently released an AI Literacy Framework, making AI knowledge a basic workforce skill for the future. This means every worker should understand: Basic AI principles AI use cases Prompting AI correctly Evaluating AI outputs Using AI responsibly AI literacy is quickly becoming a core job skill across all industries, not just tech.

Ep. 50 - Inside Trump's 2026 Cyber Strategy: Why "Check-the-Box Security" Is Dead

The U.S. just made its boldest cybersecurity move in decades. In this episode of the Cyber Resilience Brief, we break down President Trump’s 2026 Cyber Strategy—and why it signals a massive shift from reactive defense to proactive, offensive cybersecurity. What does this mean for CISOs, security leaders, and the private sector? We unpack the strategy’s most critical pillars, including: This isn’t regulation—it’s a call to action. And for organizations that fail to continuously validate their defenses, the risks have never been higher.

The CEO Who Handled a Cyber Crisis Perfectly

A banking incident early in one career showed what good leadership looks like, with senior executives handing over a credit card, arranging food, hotel rooms and proper shift rotations. Instead of demanding updates every five minutes, leadership shielded the team from pressure, supported rest cycles and focused on helping the business survive. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Missing one person could shut down everything #BusinessRisk #Vulnerable

One exercise killed off the leader on paper and left the management team to run the organisation without that decision maker or access to key mandates. The scenario exposed hidden dependencies, legal bottlenecks and fragile processes, and forced everyone to map where single points of failure threaten both business and incident response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..