Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Perimeter Defence is Dead - What's Killing Your Security Now?

Cybersecurity perimeter defence is dead. Third party risk management and supply chain security are now where breaches actually happen. Cloud security, SaaS solutions and AI agents have completely changed the threat landscape, but most organisations are still using outdated security models. In this episode of Razorwire Raw, Jim explains why everything you thought you knew about perimeter security no longer applies. Your critical business systems aren't where you think they are anymore. And those third party questionnaires you're relying on? There's a problem.

Why You Can't Trust Video of Celebrities Anymore

Deepfake clips can place public figures or executives in fabricated scandals, with contentious statements that never happened spreading at speed across social feeds. Proving something did not happen is hard, so people need a zero trust mindset for video and audio, checking sources and context before they react or share. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The Top Industries Targeted By Deepfake Scams

Financial institutions and insurers sit at the front line of deepfake abuse, with digital onboarding, KYC, AML checks and app based claims all exposed to synthetic media. Fraudsters can fake identity documents, accident photos and invoices at scale, which pushes these sectors to rethink verification beyond simple photo uploads. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How Governments Use AI Safely | AI Governance Explained

How are governments using AI while protecting citizens’ data and privacy? In this episode of AI on the Edge, Ciara Maerowitz, Chief Privacy Officer for the City of Phoenix, explains how cities implement AI governance, manage bias, ensure transparency, and assess AI risks. Learn how responsible AI frameworks, policies, and risk management help governments safely adopt artificial intelligence.

Methods for Designing AI Identity | Teleport x The Cyber Hut

Three methods for issuing identity to AI agents — and why static credentials will always eventually leak no matter how well you vault them. Ev Kontsevoy breaks down standard credentials, durable identity, and digital twins, and explains why the issuer of identity needs to be the same across your entire environment.

AppSec in the age of AI: An RSA Conference preview

Application security is at a breaking point as development teams move faster than ever, aided by AI-powered coding assistants. While these tools boost productivity, they also introduce subtle errors and insecure patterns at scale. The result: a growing backlog of vulnerabilities that outpaces traditional AppSec models. This webcast examines the risks and opportunities of AI in AppSec and who will be addressing it at RSA Conference. We’ll explore how defenders can use AI to level the playing field with automated scanning, intelligent prioritization, and secure-by-design practices.