Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

AI Awareness Gap: Bridging the Disconnect Between Tech Experts and the Public | Razorthorn Security

Amy Stokes-Waters sheds light on the disconnect between technology enthusiasts and the general public's interest in tech, specifically AI advancements. In this engaging clip, Amy discusses the challenge of communicating complex tech concepts, like AI-generated content, to those outside the IT sphere. She emphasizes the need for better education on technologies that are reshaping our media landscape. Dive into this discussion to understand why simplifying tech talk is essential for broader awareness and acceptance.

Unrealistic Cybersecurity Job Expectations: The Talent Gap Issue | Razorthorn Security

Amy Stokes-Waters critiques the unrealistic expectations in cybersecurity job descriptions, highlighting a significant industry challenge. Discover why demanding expertise in both SOC operations and pen testing for a single role, with insufficient compensation, exacerbates the talent gap. This clip exposes the harsh realities of the cybersecurity job market and the need for more realistic hiring practices to attract and retain skilled professionals.

The Evolving Perception of Cybersecurity: A Funding Gap Analysis | Razorthorn Security

Join Amy Stokes-Waters as she discusses the significant shifts in how cybersecurity is perceived over the last five years, highlighting a persistent challenge in funding. Despite spending $450 billion on information security, the scale of criminal activity, valued at $9.5 trillion, suggests a dire need for increased investment. This clip explores the financial discrepancies and emphasizes why robust funding is crucial to effectively combat cyber threats.

Hidden Risks of Bug Bounty Programmes: Are You Getting the Full Picture? | Razorthorn Security

Explore the critical questions around bug bounty programs with Amy Stokes-Waters in this insightful clip. Amy questions the reliability of crowdsourced pen testing, raising concerns about what might not be reported. Discover why trusting bug bounty programs to reveal all vulnerabilities could leave organizations exposed to cybercriminals like LockBit. This video sheds light on the potential hidden dangers and underscores the importance of comprehensive security audits.

Insider Security Risks: A Pen Testing Reality Check for Large Companies | Razorthorn Security

Amy Stokes-Waters shares a startling anecdote from her pen testing sales experience in this must-watch clip. Learn how a company with 3,000 employees misunderstood the real risks of insider threats. Amy highlights the common oversight where businesses assume 'nice' means 'safe,' exposing them to potential cyberattacks. This video underscores the critical need for rigorous network security and vigilant monitoring of internal threats.

Rethinking Security Training: Engaging Users Beyond Boring Videos

Join Amy Stokes-Waters as she challenges traditional security awareness training methods in this compelling clip. Why rely on dull videos and animations when engaging users is key to strengthening cybersecurity? Discover how making security training interesting can transform users from being the weakest link to a robust line of defense. Tune in for innovative ideas that could revolutionize how we approach cybersecurity education.

Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

Join us on this week's edition of the Razorwire podcast where host Jim chats with Amy Stokes-Waters, CEO of The Cyber Escape Room Co. Amy, transitioning from a non-traditional background into cybersecurity, shares her entrepreneurial journey and innovative approach to security awareness training through engaging escape room experiences.

Insider Threats: Shocking Offer Outside Tesla Reveals Cybersecurity Risks

Amy Stokes-Waters discusses a real-world attempt to bribe a Tesla employee for secure access, highlighting the overlooked dangers of insider threats in cybersecurity. Discover the risks businesses face from both internal and outsourced hacking efforts, and why robust security measures are crucial. Tune in for more insights into the hidden world of corporate espionage and its impact on information security.

Embracing Failure to Enhance Cybersecurity Responses | Razorthorn Security

In this enlightening episode of the Razorwire Podcast, explore the transformative power of embracing failure within organizations to accelerate response times to cybersecurity threats. Learn why fostering a culture that views mistakes as learning opportunities is crucial for rapid adaptation and improvement, particularly in handling phishing attacks—the most common method used by attackers. The discussion delves into how a shift in organizational culture can dramatically reduce the average time it takes to detect and respond to breaches, currently standing at a staggering 287 days.

Reducing Burnout in Cybersecurity: A Human-Centric Approach | Razorthorn Security

This episode of the Razorwire Podcast emphasizes the importance of a human-centric approach in cybersecurity workplaces to combat stress and reduce burnout rates. Discover how encouraging openness about mistakes and reducing process friction can not only mitigate human risk in cybersecurity but also enhance the overall well-being of professionals in the field. Learn about the benefits of fostering an environment where challenging the status quo and admitting errors are viewed as opportunities for growth and improvement.