Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Keeper Security is Preparing for Quantum Computing with Quantum-Resistant Cryptography

For decades, public key cryptography has protected global commerce, governments and enterprises. But advancements in quantum computing are forcing a fundamental reevaluation of how that protection holds up long-term. That’s why we’re rolling out quantum-resistant encryption across our solutions to help protect against future quantum-enabled threats.. Dr. Adam Everspaugh, Keeper Security’s Cryptography Advisor, explains what a quantum computer is and why preparation can’t wait.

1Password Unified Access

Today, we’re introducing 1Password Unified Access, a new identity security platform that enables organizations to: Discover AI agents, tools, and exposed credentials Secure access across humans, machines, and agents Audit every action with clear attribution AI agents are quickly moving from experimentation into real production environments, accessing systems, executing workflows, and acting on behalf of employees.

How to Scale Application Traffic Automatically with A10 FlexPool

How to Scale Application Traffic Automatically with A10 FlexPool Priyanka Mullan, Senior Product Marketing Manager at A10 Networks, explains how FlexPool revolutionizes application delivery by dynamically allocating resources based on real-time user demand. Whether you are managing a sudden traffic surge from a major online event or balancing workloads across a hybrid cloud environment, FlexPool ensures your infrastructure scales automatically, without manual intervention. Learn how to maintain peak application performance while significantly reducing operational costs.

How Degenerative AI Exposes Deepfakes

Detection tools now use so called degenerative AI to analyse every frame of a video, looking for traces of the models and methods used to generate or edit it. Generative AI produces the fake, degenerative AI hunts for subtle artefacts in pixels, giving investigators a way to flag manipulated content at scale. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Lovable vs. Bolt - Vibe Code Challenge

Which AI tool is better for building a real app without writing code, Bolt or Lovable? In this video, I put both AI app builders head-to-head using the exact same prompt to create a DIY home repair forum. From database setup to authentication, UI design, publishing, and security checks, we compare how each platform performs in real time. The goal isn’t just to generate something that looks like an app, it’s to see whether these tools can actually create something usable, functional, and potentially production-ready. We evaluate.

Identity Enrichment with the Falcon Browser Extension and Next-Gen Identity Security

Falcon Next-Gen Identity Security enriches cloud authentication with verified endpoint context using the Falcon sensor and Browser Extension. Watch the demo to see how CrowdStrike eliminates blind spots between endpoint and cloud to accelerate investigations and stop identity-based attacks.