Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The CISO's Dilemma: How To Scale AI Securely

Your board wants AI. Your developers are building with it. Your budget committee is asking for an ROI timeline. But as CISO, you're the one who has to answer when the inevitable question comes up: "How do we know this is secure?" If you're like most security leaders, you're caught between two impossible positions. Say yes to AI initiatives without proper security controls, and you're responsible when something goes wrong.

Introducing Persona's candidate verification solution: Stop AI-powered candidate fraud before it reaches your workforce

Hiring has never been easy. But in the last year, it’s taken on an entirely new level of complexity. Fake candidates have become one of the most urgent problems facing HR, talent, and InfoSec teams alike. Today’s recruiters are flooded with AI-generated resumes that are nearly impossible to distinguish from legitimate candidates. When fake candidates make it to interviews, the tactics escalate with deepfakes used to impersonate people and proxy stand-ins for technical assessments.

How three SOCs cut alert investigation time and gained visibility

Tool proliferation is compounding. Alerts are multiplying faster than teams can triage them. Visibility gaps are hiding real threats. And security teams are stuck babysitting archaic security infrastructure, rather than detecting and stopping threats. Organizations across gaming, fintech, and retail are feeling the weight of traditional, on-premises SIEMs.

Enhanced Network Visibility: A Dive into the Falcon macOS Sensor's New Capabilities

The much-anticipated Enhanced Network Visibility feature for macOS is now generally available in sensor version 7.29 or later. This new capability provides insight and improved visibility into network traffic occurring on macOS endpoints, creating a more sophisticated and comprehensive model of process behavior. In this blog, we provide an in-depth overview of this new capability.

RondoDox Botnet: From Zero to 174 Exploited Vulnerabilities

According to a 2024 report from IoT Analytics, there were 16.6 billion Internet of Things (IoT) connected devices at the end of 2023, and that number is expected to grow to 41.1 billion by 2030. This means an increased attack surface for malicious actors to take advantage of, especially given that the security posture of the vendors that provide these devices varies greatly.

Trust Nothing: The Rise of Deepfakes in Cybercrime

Are you confident you could spot a deepfake in your next meeting, or could someone be using your identity without you knowing? Welcome back to Razorwire, the cybersecurity podcast where we explore the challenges professionals face at the cutting edge of threat intelligence. In this episode, I sit down with Alexandra Jorissen, a specialist in deepfake detection and digital identity safeguards. We discuss the explosive rise of deepfake technology, where it’s already being used and what it means for personal and professional security.

How A Deepfake Heist Stole 25 Million Dollars

A finance manager followed a standard process, joined a video call with what looked like known colleagues, and approved urgent payments that totalled twenty five million dollars. Every face and voice on that call was synthetically generated, which shows how deepfakes now bypass email scepticism and hit payment workflows directly. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..