Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Yes, You Need AI to Defeat AI

Long-time followers of mine know that I am not an AI hype person. Some people might even call me an AI critic. I prefer to call myself an AI realist. I do not think AI will kill us all (despite our best efforts to bypass all guardrails and common sense). I do not think AI will replace all jobs. I do not think AI will replace all cybersecurity jobs. But I do think AI allows improvements in many areas, including cyber defenses, over traditional tools and techniques.

Announcing the Custom SAPA Agent: Security Awareness Measurement Built for Your Environment

Security awareness programs are built on measurement. Before you can reduce human risk, you need a clear understanding of where knowledge gaps exist across your workforce. For many organizations, that process starts with a baseline assessment. For years, KnowBe4’s Security Awareness Proficiency Assessment (SAPA) has provided that foundation.

The C-Suite's Biggest Mistake During a Cyber Crisis

After a major breach, grand statements about taking security seriously ring hollow when customer data sits in fraudsters’ hands. The biggest mistake in a crisis is clinging to control instead of trusting security specialists, stepping back for a short period and letting the expert lead the technical response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Best DLP solutions for enterprise data protection in 2026

Enterprise DLP solutions in 2026 must cover far more than email and USB channels. With many employees pasting data into GenAI prompts and sensitive data flowing across cloud, SaaS, and browser-based AI tools, legacy DLP architectures leave critical gaps. Choosing the right platform requires mapping where sensitive data lives, identifying real exfiltration paths, and deciding whether a standalone, native, or converged DSPM-plus-DLP architecture fits your environment.

How to Send a Large Amount of Photos: 6 Methods Compared

You have six ways to send a large amount of photos:cloud storage links, dedicated file transfer tools, email with a workaround, messaging apps, device-to-device transfer, and physical drives. Which one works best depends on how many photos you're sending, whether quality matters, and how private you need it to be. The default options most people try first all have real limits. Email cuts off around 25MB, which is about 5 to 10 full-quality photos.

14 Best Practices for Data Breach Prevention

For many organizations, a single security lapse isn’t just a technical glitch — it’s a catastrophic blow to their brand reputation and bottom line. With the global average cost of a leak reaching record highs ($4.44 million according to 2025 estimates), learning how to prevent data theft has shifted from a best practice to a business necessity. But how do you stay ahead of the latest cyber threats?

Why well-managed endpoints still get breached: The 2026 reality

As endpoints became more powerful, more mobile, and more exposed, they also became more prone to attacks. Endpoints remain one of the most targeted entry points for attacks. Attacks today are no longer random; they are targeted, deliberate, and increasingly powered by automated AI discovery tools that hunt for unmanaged gaps. Malware, ransomware, and phishing-based intrusions continue to increase, and their first level of interaction often happens on an endpoint.

How to Detect Account Takeover Attempts in the First 5 Minutes

Most ATO detection tools are watching the wrong moment. Attackers don’t start at your login page – they start days earlier, registering lookalike domains, cloning your site, and harvesting credentials before your stack sees a single signal. Knowing how to detect account takeover means moving detection upstream: to the reconnaissance stage, the cloning event, and the live harvesting window. That’s where the attack is stoppable.

Apono integration for Grafana: Enabling Just-in-Time access for data sources

For many organizations, Grafana is a central operational system. Engineers use it to investigate issues, analyze logs, review infrastructure metrics, and query production-connected databases. But while dashboards are visible, the real sensitivity lies in the underlying data sources Grafana connects to. These data sources often include systems such as logs stored in Elasticsearch or OpenSearch, SQL databases like PostgreSQL or MySQL, and Amazon CloudWatch metrics.

Beyond cyber protection: Why ESG leadership matters for MSPs

Cyber protection, management and automation of IT deployments is fundamentally an exercise in responsibility and trust. That is especially true in the age of AI, where innovation moves fast and the consequences of failure can be severe. Organizations today need confidence that their IT providers are not only technically capable, but also reliable, transparent and accountable. Entrusting a partner with your infrastructure is the ultimate trust exercise.