Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Often Should You Do a Penetration Test? | Razorthorn Security

James Rees from Razorthorn Security shares his thoughts on a LinkedIn poll that asked how often a penetration test should be performed. He reveals the results of the poll and explains why he thinks quarterly testing is the best option for most organizations. Watch this video to learn more about the benefits of regular penetration testing and how Razorthorn Security can help you with your cybersecurity needs.

Continuous Penetration Testing: discover the Razor's Edge platform from Razorthorn

Welcome to Razor's Edge, the Continuous Penetration Testing platform from Razorthorn Security. The essence of Razorthorn’s Next-Gen Continuous Pen Testing service, Razor’s Edge, is to help find vulnerabilities, verify them and perform base level exploitation to provide organisation-specific risk scores and mitigation advice to improve the overall security of an environment. We work to a schedule of scanning, testing and reporting defined by the client for the duration of the contract length.

Creating Trust in an Insecure World: Strategies for Cybersecurity Leaders in the Age of Increasing Vulnerabilities

Vulnerabilities are on the rise, and it's not just the number that's growing; the severity of these vulnerabilities is also increasing. Cybercriminals are taking advantage of these vulnerabilities to launch sophisticated attacks, leading to data breaches, ransomware, and other devastating cyber incidents.

EP 24 - Making the Leap to Post-Quantum Computing Encryption

Quantum computing is coming and it has the potential to be both exciting and terrifying… On today’s episode of Trust Issues, host David Puner speaks with cryptographer Dr. Erez Waisbard, CyberArk’s Technology and Research Lead, about quantum computing innovation and its cybersecurity implications – from data encryption to surveillance and privacy. Dr.

The Evolution of Qakbot: How Cato Networks Adapts to the Latest Threats

The world of cybersecurity is a never-ending battle, with malicious actors constantly devising new ways to exploit vulnerabilities and infiltrate networks. One such threat, causing headaches for security teams for over a decade, is the Qakbot Trojan, also known as Qbot. Qakbot has been used in malicious campaigns since 2007, and despite many attempts to stamp it out, continues to evolve and adapt in an attempt to evade detection.

DNS-Based Threats and Their Impact on Business

A Domain Name System (DNS) is a protocol that translates human-readable domain names/URLs—like favoritewebsite.com—into IP addresses that computers can read—like 135.24.56.98. DNS servers handle tens of thousands of queries that transfer minute bits of data between devices, systems, and servers—which makes DNS an attractive and easily exploitable vector for hackers (Cloudns.net).

Elevate your AWS Experience: Unleash the Power of Veeam BaaS with David Johnson and Sagi Brody

In this video, we're taking a deep dive into the world of Veeam's BaaS solutions on AWS. You'll get an insider's perspective on navigating this powerful tool, optimizing your backup strategy, and ensuring seamless recovery. With Industry Leaders David Johnson and Sagi Brody! Unleash the Potential of Your AWS Environment! In this highly informative webinar, we bring you two renowned experts in AWS Marketplace: David Johnson, Head of Business Development at AWS Marketplace, and Sagi Brody, CTO at Opti9.

How to reduce your RPO and recover rapidly from failure on your K8s Cluster with Trilio and Mirantis

What is Continuous Restore Trilio’s Continuous Restore capability enables migration and replication of stateful applications in seconds or minutes so that all Organizations can protect and use their data anywhere - regardless of what the application runs on or where the data is stored. This innovation enables data-driven organizations to access ‘Single-Source-of-Truth’ data from multiple heterogeneous clouds simultaneously, from any cloud or storage platform to another, providing near-instantaneous recovery times for your workloads.