Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

You Can Create a Convincing Deepfake in Under an Hour

A non technical user can produce a credible deepfake in under an hour using off the shelf tools and footage from normal video meetings. Common habits such as recording calls for later review give attackers enough material to train models, so every routine sales or onboarding call becomes potential training data. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

AI in Cybersecurity Certification

Positive feedback can lead to unintended consequences. A dog learned that saving kids from the River Seine earned food and praise. So he started dragging them in to “save” them. AI models optimize for feedback in a similar way. Cato’s AI in Cybersecurity course shows how to manage the risks. It’s free and earns you CPE credits.

How do I Send a Secure Email in Outlook?

Sending an unsecured email can be likened to writing sensitive information on a sticky note and leaving it on someone else's desk: anybody can intercept and share that information. Fortunately, there are ways to ensure your emails are safe from the prying eyes of hackers through encryption, meaning your message — no matter how sensitive — is seen only by the intended recipient.

Cato CTRL Threat Brief: Middle East Escalation and Summary of Notable Iranian-Linked CVEs

On February 28, 2026, Israel and the United States launched a joint attack against Iran. In retaliation, Iran launched its own attacks against Israel and US-allied countries and bases in the region. The escalation in the Middle East is ongoing. Cato CTRL is currently monitoring the threat landscape in the region.

How Employee Recognition Programs Strengthen Cybersecurity Culture in the Workplace

Most security incidents do not begin with a brilliant hacker. They begin with a normal employee having a normal day and making a normal decision. If we want stronger cybersecurity, we have to focus on shaping those everyday decisions. According to the 2025 Data Breach Investigations Report highlighted by DeepStrike, the human element is involved in roughly 60% of breaches. That number matters because it means your biggest risk is also your biggest opportunity. The same people who click can also protect.

How Good Communication Can Improve Cybersecurity Awareness

Cybersecurity is often seen as a technical challenge filled with complex code and firewalls. Many organizations focus only on the software side of protection. Real safety comes from the people using the systems every day. When teams talk clearly about risks, they create a stronger shield against digital threats.

Scammers Only Need 30 Seconds of Video to Clone You

Training a convincing voice model now needs as little as thirty seconds of audio, which public videos, podcasts and recorded calls provide in abundance. Open profiles reveal who reports to whom, so attackers can pair cloned voices with organisational charts and pressure staff into authorising payments or sharing access. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Received Someone Else's Confidential Email? Here's What To Do.

When we think about misdirected email, we often put ourselves in the shoes of the sender. After all, nobody wants to tell their manager that they might (however accidentally) be responsible for a data breach. But what you do when you’re on the other side of the inbox?