Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

December 2023

Defending the Digital Seas: Dismantling Cyber Crime with Disincentives and Alternatives #podcast

In this eye-opening video, we delve into the intriguing parallels between historical piracy and the contemporary world of cybercrime. Remember when pirates sailed the seas, preying on everyone in their path without any official refuge? Fast forward to today, where cybercriminals, like modern-day pirates, target unsuspecting individuals. Join me as we explore the concept of disincentivizing cybercrime, making it harder to succeed, and more painful if caught, and promoting alternative paths.

Unveiling the Secret Realms: Private Intelligence, Mercenaries, and Cyber Intrigues #cybersecurity

Dive into the secret world of growing art! In this video, we explore the expansion of private intelligence and the mercenary sector, questioning whether cyber warfare is now part of their arsenal. Join the discussion as we shine a light on prominent players like NSO and uncover interesting facts. Are these industries integrating with cyber capabilities? We dissect the possibilities and shed light on the shadows of individual actions. From corporate espionage scandals to Uber's infamous software installation in drivers' cars, we uncover different aspects of industrial espionage.

Lockdown Impact: Did Lockdowns Turbocharge the Rise of Cybercrime Services | Razorthorn Security

Unraveling the Cyber Odyssey: Did Lockdowns Propel the Explosive Growth of Cybercrime Services? Join us as we delve into the epic transformation triggered by global lockdowns, shaping the landscape of cybercrime services. Did the lockdowns accelerate the rise of new and sophisticated cyber services? Explore the dynamic forces at play and the undeniable impact on the cyber ecosystem. From ransomware's meteoric surge to the pivotal FBI takedown in 2015 that revealed the lucrative world of cybercrime revenue, we connect the dots to unveil the unfolding narrative.

From Cards to Cryptos: Unraveling Cybercrime's Evolution with Robert Rodriguez's Shocking Tale

Embark on a journey into the shadowy realms of cybercrime with the intriguing tale of Robert Rodriguez. Join me as we delve into the underworld of credit card fraud, retail network hacks, and the evolution that reshaped the landscape of cyber criminality.

Decoding Ransomware's Code of Conduct: Surprising Rules of Engagement & the Robin Hood Twist #crypto

Dive into the intriguing world of cybersecurity as we explore the surprising ethical guidelines followed by ransomware groups in this eye-opening video. It's crazy, but many of these cybercriminals adhere to a set of Rules of Engagement, steering clear of unthinkable targets like children's hospitals. While some still cross the line, a remarkable instance emerged when a ransomware group, upon realizing they had hit a kids' hospital, apologized and handed over the decryptor – a Robin Hood-esque gesture in the digital realm.

Unleashing the Hidden World of Cybercriminals: The Growing Threat of Cybercrime-as-a-Service

Welcome to Razorwire, the podcast where we cut through the tangled web of cybersecurity to bring you the latest insights and expert analysis. Victor Acin and Oliver Rochford, two esteemed guests, are with me in today's episode. In this episode, we’re exploring the dangerous world of cybercrime as a service and its implications for individuals, organizations, and even nation-states. Join us this week as we unveil the dark side of cybercrime. Victor, the Head of Threat Intelligence at Outpost 24, shares his expertise on the rise of cybercrime as a service. Discover how cybercriminals have adapted their tactics, the motivations driving their actions, and the alarming ease with which they operate. Stay ahead of the game with insider knowledge from Oliver's research, where he discusses the striking similarities between cybercrime services and legitimate tech services. Learn about the techniques used by cybercriminals to infiltrate organizations and exploit their vulnerabilities. Whether you're a seasoned professional or just starting your cybersecurity journey, this episode offers some excellent, practical advice for strengthening your defences. We share some effective ways to protect against credential theft, insider threats, and targeted attacks. Hear about tried and trusted remedies recommended by our experts that can make a significant impact on securing your organization. So, if you're a cybersecurity professional looking to expand your knowledge and sharpen your skills, join us on Razorwire as we unravel the intricate world of cybercrime as a service.

Cyber Crime Surge: Unmasking Employee Collusion and Modular Attack Chains || Razorthorn Security

In the evolving landscape of cyber threats, a seismic shift has occurred over the last couple of years. Join us in unraveling the intricate web of cyber crime as a service, where operators entice employees into collusion by dangling lucrative financial incentives. This phenomenon has contributed to a staggering rise in organized cyber attacks.

Unraveling Conspiracies: Hacking, Allegiances, and Corporate Chess || Razorthorn Security

Dive deep into the realm of intrigue with our latest video, "Double Conspiracy Theories Unveiled!" Grab your tin foil hats because we're about to explore two mind-boggling mysteries that will leave you questioning everything. In Conspiracy #1, we venture into the shadows to unravel the mystery of a hacking incident. Who was behind it, and were they working for someone sinister? The plot thickens as we peel back the layers, and the truth seems to be shrouded in secrecy.

Legal Risks for CESOs in Public Companies: A Critical Advisory for Executives Worldwide #podcast

In this eye-opening video, we delve into the complex landscape that CESOs associated with publicly listed companies are currently facing. The stakes are high, and executives find themselves in a challenging position with limited options. Whether it's the proverbial 'damned if you do, damned if you don't' scenario or the looming possibility of legal action, the urgency for thorough documentation and sign-offs cannot be overstated.

ISO 27001 Truths: Appliance Security Unraveling Risks in Corporate Governance |Razorthorn Security

Unlock the reality behind ISO 27001 certification in this eye-opening video. Just because a company boasts ISO 27,1 doesn't automatically mean they are secure. Join me as we delve into the intricacies of convincing auditors, the dangers of mistaking appliances for security, and the critical vulnerabilities that might be overlooked. Prepare for some candid insights that might stir the pot! Share your thoughts in the comments - I'm ready for the discussion! Remember, an appliance does not equal security.

Corporate Espionage Exposed: Unveiling High-Level Intrigues for Self-Preservation | Scandal Unveiled

Uncover the shocking truth behind corporate maneuvers in our latest video! Watch as high-level executives resort to drastic measures to protect themselves, leaving a trail of deceit and manipulation. In this eye-opening exposé, we delve into a covert plan to divert blame, erase evidence, and scapegoat an unsuspecting employee. The high-stakes game of self-preservation unfolds, revealing the cutthroat reality lurking behind the polished exterior of big corporations.

Unlocking Corporate Secrets: Always Demand Proof! || Razorthorn Security

Uncover the truth with our latest video, "Always Get Proof: Corporate Secrets Revealed!" In a world where actions speak louder than words, we delve into the unsettling reality of individuals, including CISOs and InfoSec professionals, who discreetly store sensitive information beyond corporate boundaries. Don't be in the dark – empower yourself with knowledge! Explore the hidden practices that often go unnoticed. Learn why demanding proof is crucial in today's digital landscape. Discover the risks associated with storing confidential data outside corporate limits.

SolarWinds CEO Blames Intern for 'SolarWinds123' Password Leak Scandal! || Razorthorn Security

Dive deep into the SolarWinds scandal as the former CEO points fingers at an intern for the notorious 'SolarWinds123' password leak! Uncover the critical lapse in password security that lingered undiagnosed for years. In 2019, an independent security researcher stumbled upon 'SolarWinds123' exposed on the public internet, leading to a stern warning to the company about the vulnerable file server.

SEC Allegations: SolarWinds CISO Aware of Cyber Risks Who Should Fix Vulnerabilities? #podcast

Welcome to our latest video where we unpack the recent SEC allegations surrounding SolarWinds CISO's awareness of cybersecurity risks and vulnerabilities. The SEC claims that despite this awareness, the issues were not adequately addressed. Join us as we delve into the critical question: Is the CISO now responsible for fixing vulnerabilities?

AI Reality Check: Navigating High False Positives Today | Proceed with Caution | Razorthorn Security

In this eye-opening video, we dive deep into the current state of AI, shedding light on a significant challenge it grapples with - a high false positive rate. While optimism is warranted for the future, I candidly express my belief that we are still a number of years away from achieving true production readiness.

SolarWinds' CISO Under SEC Scrutiny: The Impact On The Infosec Community || Razorthorn Security

Welcome to Razorwire, the podcast where we cut through the noise to bring you incisive discussions on all things cybersecurity. I'm your host, Jim, and in today's episode, we delve into the SEC charges against SolarWinds CISO, a case that has sent shockwaves through the infosec community. In this episode, our guests Iain Pye and Chris Dawson discuss the hype surrounding the trial and its impact on the infosec community and the potential consequences for all Chief Information Security Officers (CISOs). We also explore the uncertainties surrounding the CISO's responsibilities and actions within the organisation regarding addressing security vulnerabilities, as well as the potential implications of the SEC ruling on CISOs' risk aversion and self interest. Lastly, we talk about the dynamics of security compliance certifications and the potential manipulation involved in obtaining them. If you're a cybersecurity professional, join us as we dissect the complexities of CISO responsibilities, the SEC's pursuit of individuals over organisations and the implications of legal actions on the infosec landscape. Tune in for an insightful discussion that will challenge your perspectives and keep you on the cutting-edge of cybersecurity issues.

Decoding the SEO Dilemma: Exploring the Divide on AI's Role in Production Environments #podcast

Dive into the heart of the SEO dilemma with me as we unravel the intriguing discussions surrounding the use of AI, particularly in production environments. In this video, I explore the current sentiments and general consensus among CX leaders, shedding light on the varied perspectives within the SEO community. SEO and the AI Frontier: Curious about what the CESOs have been saying? Join me as I dissect the thoughts and opinions circulating within the industry. It's a dynamic landscape with diverse viewpoints on the role of AI, especially in shaping the future workforce.

Boosting Creativity: Unleashing the Power of AI in Marketing and Content Creation #podcast

Embark on a journey with me as I unveil the game-changing tool that has become an integral part of my daily routine. For the past three to four months, I've been leveraging AI to supercharge my marketing efforts as a one-man band. The tool has evolved into a powerhouse, transforming my messaging, features, and benefits into compelling content across various platforms.

Securing the Basics: Adapting Information Security Programs to Evolving Threats #CyberSecurity

In this insightful video, we delve into the dynamic world of Information Security Programs and the constant evolution they undergo. As digital threats continue to advance, these programs inch themselves up, adapting to the ever-changing landscape. Understanding why Information Security Programs change is crucial in today's interconnected world. As threats become more sophisticated, it's essential to stay one step ahead. This video breaks down the key elements of these programs and how they adjust to address emerging challenges.

Unveiling Jedi: Navigating the Power and Pitfalls with Critical Baggage || Razorthorn Security

In the realm of using Jedi, there's a crucial aspect to consider – the level of critical baggage required for effective utilization. It's not just about diving in; it's about understanding the nuances and not blindly trusting the results. This is a pitfall in the industry, where some see Jedi tools as a way to be blissfully ignorant of the facts they query. Many trust it implicitly, assuming that with the power of Jedi, the answers must be indisputable. However, it's essential to recognize that the responses are a foundation, a starting point that demands further exploration.

Unlocking Deep Thought: Navigating the Art of Asking for the Right Answers || Razorthorn Security

Ever felt like you're channeling your inner Deep Thought from Hitchhiker's Guide when seeking answers? Join me on a journey where we explore the art of asking the right questions. It's not just about syntax; it's about unlocking the profound. In this video, I delve into my experiences, including trying out tools like Dary with mixed results. Discover the importance of framing your queries and uncovering the true question behind what you seek.