Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SolarWinds' CISO Under SEC Scrutiny: The Impact On The Infosec Community || Razorthorn Security

Welcome to Razorwire, the podcast where we cut through the noise to bring you incisive discussions on all things cybersecurity. I'm your host, Jim, and in today's episode, we delve into the SEC charges against SolarWinds CISO, a case that has sent shockwaves through the infosec community. In this episode, our guests Iain Pye and Chris Dawson discuss the hype surrounding the trial and its impact on the infosec community and the potential consequences for all Chief Information Security Officers (CISOs). We also explore the uncertainties surrounding the CISO's responsibilities and actions within the organisation regarding addressing security vulnerabilities, as well as the potential implications of the SEC ruling on CISOs' risk aversion and self interest. Lastly, we talk about the dynamics of security compliance certifications and the potential manipulation involved in obtaining them. If you're a cybersecurity professional, join us as we dissect the complexities of CISO responsibilities, the SEC's pursuit of individuals over organisations and the implications of legal actions on the infosec landscape. Tune in for an insightful discussion that will challenge your perspectives and keep you on the cutting-edge of cybersecurity issues.

MOVEit Breach Creates More Victims; 105k Records Stolen from Insurance Group

The Pan-American Life Insurance Group (PALIG) provides various insurance plans across the states and beyond. PALIG employs more than 2,100 staff and has a 110-year history of providing insurance to those needing it. Companies and individuals turn to PALIG in their time of need, and PALIG returns the favor by providing high-quality insurance options.

90% of Energy Companies Experienced a Third-Party Breach

More than two years after the major U.S. pipeline ransomware incident, the SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has released a new report revealing that 90% of the largest global energy companies have experienced a third-party breach in the past 12 months. This research highlights the uphill battle faced by the energy industry in combating emerging threats across the supply chain.

Third-Party Data Breach Response Playbook

The risk of data breaches has become an omnipresent concern for businesses and organizations. And as technology continues to evolve, so do the tactics of cybercriminals. One critical aspect of cybersecurity strategy involves preparing for and responding to third-party data breaches. A well-constructed response playbook is indispensable in mitigating the potential damages and ensuring a swift recovery.

Securing your cloud infrastructure with Tines & Wiz

Wiz and Tines offer a powerful solution to remediate any cloud risks detected in minutes. Wiz scans your entire cloud infrastructure and gives you complete visibility into anything that runs in it - raising vulnerabilities and bringing them to the forefront. Tines’ no-code platform then transforms, analyzes, and prioritizes information from Wiz to handle cloud remediation alerts automatically without needing to engage developers or write a single line of code.

Reflecting on 2023: Evolving our Product, Deepening Partnerships, and Staying Committed to the Security Community

As the new year approaches, security professionals and analysts alike are taking a step back to review what has transpired over the past twelve months. At Devo, 2023 was an exciting year full of change and progress. As we look forward to 2024, we want to take some time to reflect on Devo’s year across product enhancements, analyst recognition, partnerships, and community engagement.

Centripetal Partners With Tiger to Provide Cutting-Edge Cybersecurity Innovation to the UK Market for the First Time

Centripetal announces that its award winning, patented cybersecurity threat solution is available for the first time ever across the UK as a result of its strategic partnership with Tiger. With this partnership, Tiger and its customers will have a stronger approach to cybersecurity, putting operationalised threat intelligence at the forefront, moving from a reactive to proactive defence, and helping security teams be more efficient and effective.
Featured Post

Looking to 2024: Data, AI and security will be top priorities for businesses

The technology landscape has evolved significantly over the last year with the introduction of technologies such as ChatGPT and other generative AI tools taking the market by storm, while raising concerns about data security and more. As we move forward into 2024, we anticipate that the impact these new technologies have made this year means they will continue to pave the way forward, with AI remaining a hot topic in the industry, while data security concerns rise around it.