Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ep. 50 - Inside Trump's 2026 Cyber Strategy: Why "Check-the-Box Security" Is Dead

The U.S. just made its boldest cybersecurity move in decades. In this episode of the Cyber Resilience Brief, we break down President Trump’s 2026 Cyber Strategy—and why it signals a massive shift from reactive defense to proactive, offensive cybersecurity. What does this mean for CISOs, security leaders, and the private sector? We unpack the strategy’s most critical pillars, including: This isn’t regulation—it’s a call to action. And for organizations that fail to continuously validate their defenses, the risks have never been higher.

The CEO Who Handled a Cyber Crisis Perfectly

A banking incident early in one career showed what good leadership looks like, with senior executives handing over a credit card, arranging food, hotel rooms and proper shift rotations. Instead of demanding updates every five minutes, leadership shielded the team from pressure, supported rest cycles and focused on helping the business survive. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Missing one person could shut down everything #BusinessRisk #Vulnerable

One exercise killed off the leader on paper and left the management team to run the organisation without that decision maker or access to key mandates. The scenario exposed hidden dependencies, legal bottlenecks and fragile processes, and forced everyone to map where single points of failure threaten both business and incident response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

APIs Are Critical Infrastructure. Why Aren't We Treating Them That Way?

‍In this session, we take an in-depth look at what it truly means to treat APIs as critical infrastructure. Using industry data and real-world examples, we explore the gap between how much businesses rely on APIs and how well they are actually protected. And we talk about why that gap introduces operational and regulatory risks.

Secure Enterprise AI Apps and Agents: Visibility, Governance, Runtime Protection

When you deploy an AI application, do you know what's being sent into it — or what's coming back out? Cato AI Security provides runtime protection for the AI applications your organization builds and deploys, with real-time enforcement, sensitive data anonymization, and a complete audit trail across every interaction. Learn more or request a demo at catonetworks.com.

Modern Application Delivery Requires Unified Management & Flexible Licensing

Modern Application Delivery Requires Unified Management & Flexible Licensing Jamison Utter and Priyanka Mullan, Senior Product Marketing Manager at A10 Networks, discuss the fundamental infrastructure that powers today's modern applications. While technologies like AI and APIs often steal the spotlight, the true backbone of high-performing digital services lies in robust Application Delivery Controllers (ADCs).

Rethinking Application Delivery for the AI Era

Rethinking Application Delivery for the AI Era Is your network strategy keeping up with the AI era? Jamison Utter, Field CISO at A10 Networks, challenges IT leaders to move beyond "piecemeal" infrastructure and rethink their approach to application delivery. As organizations face the dual pressure of integrating AI workloads and managing a vast "fleet" of hybrid devices, the old ways of operating are becoming a liability. Jamison discusses the true cost of administrative overhead and the urgent need for a more flexible, simple, and future-proof vendor strategy.