Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Good Communication Can Improve Cybersecurity Awareness

Cybersecurity is often seen as a technical challenge filled with complex code and firewalls. Many organizations focus only on the software side of protection. Real safety comes from the people using the systems every day. When teams talk clearly about risks, they create a stronger shield against digital threats.

Scammers Only Need 30 Seconds of Video to Clone You

Training a convincing voice model now needs as little as thirty seconds of audio, which public videos, podcasts and recorded calls provide in abundance. Open profiles reveal who reports to whom, so attackers can pair cloned voices with organisational charts and pressure staff into authorising payments or sharing access. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Received Someone Else's Confidential Email? Here's What To Do.

When we think about misdirected email, we often put ourselves in the shoes of the sender. After all, nobody wants to tell their manager that they might (however accidentally) be responsible for a data breach. But what you do when you’re on the other side of the inbox?

Perimeter Defence is Dead - What's Killing Your Security Now?

Cybersecurity perimeter defence is dead. Third party risk management and supply chain security are now where breaches actually happen. Cloud security, SaaS solutions and AI agents have completely changed the threat landscape, but most organisations are still using outdated security models. In this episode of Razorwire Raw, Jim explains why everything you thought you knew about perimeter security no longer applies. Your critical business systems aren't where you think they are anymore. And those third party questionnaires you're relying on? There's a problem.

Why You Can't Trust Video of Celebrities Anymore

Deepfake clips can place public figures or executives in fabricated scandals, with contentious statements that never happened spreading at speed across social feeds. Proving something did not happen is hard, so people need a zero trust mindset for video and audio, checking sources and context before they react or share. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The Top Industries Targeted By Deepfake Scams

Financial institutions and insurers sit at the front line of deepfake abuse, with digital onboarding, KYC, AML checks and app based claims all exposed to synthetic media. Fraudsters can fake identity documents, accident photos and invoices at scale, which pushes these sectors to rethink verification beyond simple photo uploads. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

What You Need to Know about the Stryker Cyberattack

Stryker Corporation is a Fortune 500 medical technology company headquartered in Kalamazoo, Michigan. Founded in 1941, Stryker manufactures surgical equipment, orthopedic implants, neurotechnology, hospital beds, and robotic surgery systems. The company employs approximately 56,000 people globally and reported over $25 billion in revenue for 2025. Stryker's products reach more than 150 million patients annually across 61 countries.

Top 10 Customer Identity and Access Management (CIAM) Vendors of 2026

When someone registers for an online service or healthcare portal, logs into an eCommerce store, or uses a streaming platform, the first interaction usually involves identity and authentication. For businesses, this moment is critical because it connects security, customer experience, and trust.