Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know about the LexisNexis Data Breach

LexisNexis Legal & Professional is a global provider of legal, regulatory, and business information used by lawyers, corporations, governments, and academic institutions. A division of RELX Group based in London, the company was founded in 1970 and is headquartered in Atlanta, Georgia. LexisNexis operates 40 offices worldwide with approximately 11,000 employees, serving customers in more than 180 countries.

The best compliance audit software for 2026

Compliance audits that rely on manual, disconnected processes often turn into a scramble across spreadsheets, email threads, and unclear ownership. And for resource‑constrained teams, every hour spent chasing evidence or reworking controls is an hour not spent shipping products. ‍ In 2025, the right compliance platform can do more than prep you—it can help you run your audit end-to-end, from readiness to report, with real-time evidence and auditor collaboration built in.

SOC Audit Checklist for Cybersecurity Compliance

A SOC audit (System and Organization Controls audit) is an important part of making sure that security measures are strong and that regulations are followed in today’s security environment. Through SOC audits, companies can demonstrate their commitment to best security practices by ensuring the safety of sensitive data and smooth operations.

The 14 Best Data Loss Prevention (DLP) Vendors in 2026

It’s getting harder than ever for businesses to keep their data safe. Between remote work, cloud services, and third-party integrations, sensitive information now moves faster and across more touchpoints than traditional security models were built to handle. Luckily, there’s a new generation of data loss prevention tools on the market. Ones that boast advanced features and leverage AI to resolve data security incidents.

Meeting European Data Protection Standards in CRM Systems

If your business involves working with people in Europe, then it is likely that you are already familiar with the General Data Protection Regulation (GDPR). This system has revolutionized how businesses operate in regard to people's information since it was introduced. Not only does information need to be protected against breaches, but people's rights to their information must be respected. For most businesses, it is the CRM system that houses information. It is therefore important to ensure that your CRM system complies with these regulations in Europe. This is not just a technical requirement; it is a business imperative.

Crypto Founders Face a Complex Compliance Maze as Global Regulations Tighten

The crypto industry has entered a new regulatory era. Governments and financial authorities across the world are introducing stricter rules that affect everything from licensing and custody to technology infrastructure and cross-border operations. For founders launching global platforms, navigating these frameworks has become one of the biggest operational challenges.

What Data Is Required for EU AI Act Compliance

The EU AI Act places significant emphasis on documentation because regulatory oversight depends on an organization's ability to demonstrate how its AI systems operate and how associated risks are managed. Compliance is not determined solely by how an AI system performs, but by whether the organization can provide evidence that appropriate governance, risk controls, and oversight mechanisms are in place throughout the system lifecycle.

North Korean Hackers Are Using Deepfakes to Get Jobs

Recruiters now see job candidates turn up on camera using deepfakes to hide their identity, including state linked operators who want access to source code and infrastructure. Small visual glitches used to give these attempts away, but quality keeps improving, which forces organisations to review hiring, verification and remote work security. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..