Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

Coffee with Jim - Securing Against Supply Chain Cyber Attacks

Following the ransomware attack on US IT firm Kaseya, join us for a chat about the ever-increasing need to secure ourselves successfully against not only direct ransomware attacks, but those that affect us through our supply chains. An estimated 200+ firms have been crippled by the attack on Kaseya, simply because they use Kaseya’s software. The implication of this is that it can feasibly happen to any aspect of your supply chain, so if cyber security is not high on your board’s list of priorities, it really should be. How could the attack on Kaseya, and other supply chain attacks, have been avoided? How can you reduce the probability of it happening to your own organisation? And crucially, how can you make the solution cost effective?

Hack Your Way To Your Dream Job In Cyber Security

Part 1 – Top Tips for Job Applications Firstly this week, we’ll be addressing a question posed by one of our masterclass attendees: “I am currently studying cyber security and I would love to know what you look for in candidates?” This is a great question and the answer is critical in helping you get into cyber security – I’ll give you my top tips in the first part of our masterclass.

The Need for a Universal Set of Information Security Regulations: Insights from Industry Experts

In this video, we discuss the importance of having a joined-up approach to information security regulations. As a believer in creating a think tank of different information security professionals from various industries and stages of their careers, we explore the benefits of having a universal set of regulations that are not set hard in stone, but rather adaptable to different companies' needs. We understand that different companies have different security measures depending on their business activities, and we aim to bring together experts to develop a comprehensive and flexible set of regulations that can be universally implemented.

Strengthening Cyber Security: The Impact of Compliance and Legislation

Josh Davies, Keith Christie-Smith, and I dive into the world of legislation and compliance and explore the stark contrast between the need for rigorous security and the burden placed on businesses to comply. “One of the big problems we have in security is that you spend all this money pre-empting your defence in depth to try to protect you against things that you could perceive could happen to you." Josh Davies

The Importance of Isolated Backups for Cybersecurity

In this video, we discuss the critical role of isolated backups in protecting your organization from cyber threats such as DDOS attacks and ransomware. We explain how disk backups are done on a daily, weekly, or monthly basis and can be stored in a safe and controlled environment, ensuring that critical data can be restored in the event of a breach. By keeping backups isolated from your network infrastructure, you can prevent cybercriminals from accessing them and ensure that your organization can recover quickly and effectively.

Cybersecurity Advice for Businesses Without Information Security Professionals

In this video, we explore what businesses without information security professionals can do to protect themselves from cyber threats. While it would be ideal for all businesses to have experienced cyber personnel who can advise on critical assets and best steps, this is not always possible. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

Fallout from Paying Ransomware: A UK Government Perspective

In this video, we discuss the potential consequences of organizations paying ransomware, specifically from a UK government perspective. We explore the hypothetical scenario of an organization being hit by the Conti ransomware and having the financial means to pay the ransom. While this may unlock their systems and maintain business continuity, it also raises questions about the legality of paying ransoms and the potential fallout from doing so. We delve into the potential repercussions of breaking the law and the importance of having robust disaster recovery policies in place to minimize the impact of such attacks. Join us as we explore this complex and timely issue.

Analysis of Recent Official Statements on Ransomware Sanctions

James Rees questions the motivations behind the decision, whether it is due to ransomware or political sanctions. Connect with Your host James Rees Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

The Two-Step Ransomware Attack: What British Businesses Need to Know

Ransomware attacks can cripple businesses in more ways than one. Hackers can lock up your systems and hold your data for ransom, leaving you with no choice but to pay up. In this video, we explore the two-step ransomware attack and how it can affect British businesses. We discuss how hackers can encrypt your data and demand payment to unlock it, as well as how they can exfiltrate your data and hold it for ransom.