Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

Halloween Special - Spooky Videos - Real or Fake? Razorthorn Team Reactions

It's Halloween once again and that means it's time for some spooky ghost videos, chilling true scary stories and unbelievable caught on camera horror stories! In this special Halloween edition of our channel, you'll get to watch some of the scariest ghost videos recently recorded along with your host, James Rees, and two of the Razorthorn team, Amy Tate and Jite Okoh. So grab your Halloween costumes and get decide for yourself - are they real?

Criminal Minds: How the Cyber Crime World Works | Razorwire Podcast

EP08. Criminal Minds: How the Cyber Crime World Works Keywords: criminals, cybercrime, cybersecurity, ransomware, Welcome again to the Razorwire podcast. Sun Tzu wrote that if you know your enemy and yourself then you need not fear the outcome of all your battles. In this episode, we discuss the enemy, how they work, how the larger gangs are set up and the dangers of large, organised cybercrime gangs vs the smaller gangs. We also take a look at how they chose a target and why.

Women In Cyber Security | Razorwire Podcast

We're back with another episode of the Razorwire Podcast! In our new episode, we're going to talk about women in cyber security. As part of this, I've invited three fantastic women on this podcast who are leaders in their fields. Firstly, we have Megan Brown, our guest host for this episode. Megan is currently Head of International Sales at LogicGate. Megan’s guests today may be familiar to you from previous episodes: Stefania Chaplin, a solutions architect at GitHub, and Claire Davies, CISO at Arriva Group.

Partnership announcement between Electric Miles and Razorthorn

We’re delighted to announce that we have teamed up with Electric Miles, B2B SaaS company providing EV charging software to charger manufacturers, offering a combined service for Electric Vehicle (EV) charger manufacturers and resellers to ensure compliance with the upcoming December 2022 cyber security regulations.

Cyber Attack Crisis Simulation & Incident Response | Spotlight on Technology

In this episode of Spotlight on Technology we’re joined by Marie Hargraves, Cyber Workforce Advisor at Immersive Labs, to discuss crisis simulation and incident response testing. What would you do if your organisation was the subject of a cyber attack? Having an incident response procedure is critical, but even if you have one, how can you be sure it will work? How can the process be refined? Marie talks to us about the challenges facing businesses when it comes to incident response, and how these challenges can be overcome to ensure there is a robust plan in place if the worst should happen.

Machine Learning, AI, & Cyber Security Part 2: Malicious Actors | Razorwire Podcast

- Machine Learning, AI & Cyber Security Part 2: Malicious Actors Welcome to a new episode of the Razorwire Podcast! Welcome to part two of our episode on Machine Learning, AI and Cyber Security. In part one, we discussed what it will be like for us as security professionals when we have access to AI tools, what we are doing with them now and how we could use them in future. In part two, we are re-joined by our guests Oliver Rochford of Securonix and Jonathan Care, a mentor of mine who specialises in cyber security and fraud detection.

Machine Learning, AI & Cyber Security Part 1: Used for Good

Welcome to another episode of Razorwire Podcast! We are joined today by Oliver Rochford of Securonix and Jonathan Care, a mentor of mine who specialises in cyber security and fraud detection. As AI and its application in cyber security are such a big topic, this podcast will be in two parts. We will discuss machine learning and artificial intelligence for information security in the first part of our discussion today.

Identity Management | Spotlight on Technology

Welcome to another edition of Spotlight on Technology! In this episode, we’re joined by Tim Keeler, Founder and CEO of Remediant, to discuss using identity management and privileged access management as part of your defence in depth strategy. Stolen account credentials are one of the most common attack vectors for malicious actors. If a hacker uses the credentials of a user with privileged access, it could be game over for that company within a matter of minutes.

Cyber Security Professionals Shortage, Burnout & How To Protect Against It | Razorwire Podcast

Welcome to another episode of Razorwire Podcast! In this episode, our guests are Oliver Rochford of Techcron, who you've met in earlier episodes, and Stefania Chaplain, a solutions architect, discussing the skills shortage, burnout in cyber careers, and remote working. Cybersecurity offers both rewards and challenges simultaneously. Security providers in their early careers struggle to find work, while recruiters struggle to find the proper role and qualification for their security needs as cybersecurity is a multifaceted field.