Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 51 - 2026 Cyber War Update: Handala, MuddyWater, and the Rise of Destructive Attacks

Iranian cyber attacks are escalating—shifting from espionage to destructive, large-scale operations. In this episode, we break down what CISOs need to know. Host Tova Dvorin and offensive security expert Adrian Culley analyze the latest Iranian cyber threat activity, including groups like Handala (Void Manticore) and MuddyWater (Mango Sandstorm), and how their tactics are evolving.

Exposure Management - Tanium Tech Talks #157

Exposure management goes beyond CVEs. In this Tech Talk, see how Tanium helps you identify, prioritize, and remediate real risk across vulnerabilities, misconfigurations, compliance gaps, and more. You'll see how Tanium: Goes beyond CVEs to include misconfigurations, compliance failures, certificates, and lateral movement Uses benchmarks, dashboards, and risk scoring to prioritize what actually matters Connects discovery and remediation - from compliance policies to third‑party app patching.

Session on Most Dangerous Cybersecurity Attacks on Enterprises and How to Prevent Them, ETCISO 2026

In this talk at ETCISO SecuFest 2026, our Founder & CEO Mr. Anirban Mukherji discusses dangerous cyberattacks on enterprises and prevention strategies. AI has accelerated our development of IAM, MDM, and DLP solutions from months to weeks, unlocking cybersecurity opportunities. Key topics include the four AI security pillars (security from/for/of/using AI), the Replit database incident, AI agent vulnerabilities, defenses such as sandboxing and SSO/MFA, data privacy requirements beyond consent, and AI's influence on digital marketing and talent strategies.

Gary Hibberd on InfoSec, GDPR and Owning Your Space

This episode explores why information security needs more wisdom, less noise and fewer empty promises about being “GDPR compliant.” It covers slowing down, valuing data properly, cutting through bad advice and why InfoSec professionals need to own their place as integral voices in modern organisations.  ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The Future of Intelligent SOC -- Customer Brown Bag -- March 19th, 2026

Join us as Christopher explores how to build a modern, intelligent SOC with decision-ready detection, shared adversary context, and automated response that empowers faster, more confident security operations, featuring the role of the Sumo Logic SOC Agent in streamlining investigations and accelerating response.

Ep 35: RSAC FOMO? Dojo AI Demo

As we gear up for RSA Conference, we give viewers a sneak peek at Sumo Logic's SOC analyst agent, which turns a 45-minute analyst investigation into a five-minute AI-powered sprint. We walk through live demos showing how the agent automatically generates queries, maps threats to MITRE ATT&CK, and hands you recommended remediation actions all without making you switch tabs or tools. We also show off MCP integration that lets teams collaborate on active investigations right from Slack, because no one should be chained to their war room when there's dinner to be had.

Your AI Isn't Broken... Your Data Is #shorts #ai

Your AI works perfectly during testing… but suddenly fails in production. Why? The problem usually isn’t the model — it’s the data. Synthetic data looks clean and structured. But real-world data is messy: typos, missing values, broken formats, and unexpected edge cases. When AI models train only on synthetic datasets, they never learn how to handle real-world complexity. In this video, we explain why synthetic data can break AI systems and how using real production data safely can make AI more reliable.