Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Meet the Industry's First GPU-Powered SASE Platform with Native AI Security

AI has moved from experimentation to a strategic enterprise imperative. It’s no longer about whether organizations will adopt AI, but whether their security architecture can govern it at the speed and scale at which it is being embedded into the business. This is not a future concern. It is today’s operational mandate to: Securing AI is not limited to software applications and agents.

I Read Cursor's Security Agent Prompts, So You Don't Have To

Cursor's security team built four autonomous agents that review 3,000+ PRs per week, catch 200+ vulnerabilities, and open fix PRs automatically. The engineering is impressive, and the prompts are shockingly simple. But there's a meaningful gap between "LLM agents reviewing PRs" and "enterprise security program," and that gap is exactly where things get interesting.

Securing Homegrown Agents in Runtime: The Value of Zenity + Microsoft Foundry

How the integration works: Zenity integrates with the Foundry control plane to inspect agent behavior and enforce security policies inline at runtime. Over the past year, Microsoft Foundry has emerged as a cornerstone for enterprises building and deploying homegrown agents at scale. Organizations across industries are using Foundry to move beyond experimentation and into production, creating AI agents that can reason, invoke tools, access enterprise data, and automate complex workflows.

Why Marketing Teams Are Rethinking the Way Customer Personas Are Built

How well do marketing teams really understand their customers today? For years, businesses have relied on buyer personas (detailed profiles representing their ideal customers) to guide messaging, campaigns, and product positioning. And the concept has clearly gained traction: studies show that 44% of marketers already use buyer personas, while another 29% plan to adopt them soon.

How Degenerative AI Exposes Deepfakes

Detection tools now use so called degenerative AI to analyse every frame of a video, looking for traces of the models and methods used to generate or edit it. Generative AI produces the fake, degenerative AI hunts for subtle artefacts in pixels, giving investigators a way to flag manipulated content at scale. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Agent Skills are the New Packages of AI: It's Time to Manage Them Securely

Let’s talk about agent skills. As the AI agent ecosystem matures, we’re seeing a major shift in how users equip agents to run automated workflows. While robust protocols such as MCP exist to handle complex system integrations and authentication, skills have emerged as the go-to, low-friction way to shape an agent’s day-to-day behavior. Skills are extremely easy to adopt. In many cases, they are simply lightweight files that orchestrate scripts and commands.

See through document fraud with Document AI Enhanced Fraud Detection

On April 2, 1796, a full house packed the Drury Lane Theatre in London, eager to witness the first showing of a newly discovered Shakespeare play. The problem was that William Henry Ireland wrote the play, Vortigern, and the entire production was a hoax. Although there was some controversy before opening day, several experts reviewed the manuscript and supporting documents and confirmed that the play was a long-lost Shakespeare original.

Code Review That Learns: Inside Cato R&D's Self-Evolving PR Review Agent

Agentic AI promises to improve work processes in all domains and industries. R&D is no different. Recently, Cato R&D built an internal self-evolving pull request (PR) review agent that keeps reviewers in flow by commenting only on high-impact, high-confidence issues, validating every change against its spec from the PR and Jira, and learning continuously from developer feedback through long-term, episodic memory. What were the results?