Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Insider Threats: Shocking Offer Outside Tesla Reveals Cybersecurity Risks

Amy Stokes-Waters discusses a real-world attempt to bribe a Tesla employee for secure access, highlighting the overlooked dangers of insider threats in cybersecurity. Discover the risks businesses face from both internal and outsourced hacking efforts, and why robust security measures are crucial. Tune in for more insights into the hidden world of corporate espionage and its impact on information security.

Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

Join us on this week's edition of the Razorwire podcast where host Jim chats with Amy Stokes-Waters, CEO of The Cyber Escape Room Co. Amy, transitioning from a non-traditional background into cybersecurity, shares her entrepreneurial journey and innovative approach to security awareness training through engaging escape room experiences.

The Howler - Episode 8: Andrew Burback, Chief Information Office & SVP of Operations

In this episode, our hosts sit down with Andrew Burback, Chief Information Office & SVP of Operations, as he shares about his journey from accounting to sales operations & IT, his leadership philosophy rooted in his trust of his team, as well as his love for Subway and his go-to sandwich order!

Revolutionizing Religious Spaces: The Future of Security with Brivo

Dive into the world of cutting-edge security with Brivo as we explore how to transform religious communities worldwide. In this enlightening video, we delve into the importance of enhancing security and efficiency in religious spaces, ensuring the safety of congregations everywhere.

Keeper Webinar: Building a Robust Governance, Risk & Compliance Framework: Challenges & Solutions

IT Compliance doesn't have to be chaotic. Join Teresa Rothaar, Keeper Security's Governance Risk & Compliance Senior Analyst, in this webinar for ActualTech Media on the challenges and solutions to build a robust GRC framework. Keeper helps every organization get full visibility and control over employee password strength, credential sharing, permissions, zero-trust network access and dark web exposure, strengthening auditing and compliance for HIPAA, PCI DSS, SOX, GDPR, CCPA and more.

Beyond Quick Fixes: Tackling Burnout in Cybersecurity with Systemic Change | Razorthorn Security

This Razorwire Podcast episode tackles the deep-rooted issue of burnout in cybersecurity, emphasizing that superficial solutions like wellness classes are not enough. Discover how addressing burnout requires comprehensive, multidisciplinary approaches that focus on both individual resilience and systemic organizational changes. Learn how poor organizational culture contributes to high burnout and attrition rates, and explore actionable strategies to create a more supportive and sustainable work environment for information security professionals.

Reducing Burnout in Cybersecurity: A Human-Centric Approach | Razorthorn Security

This episode of the Razorwire Podcast emphasizes the importance of a human-centric approach in cybersecurity workplaces to combat stress and reduce burnout rates. Discover how encouraging openness about mistakes and reducing process friction can not only mitigate human risk in cybersecurity but also enhance the overall well-being of professionals in the field. Learn about the benefits of fostering an environment where challenging the status quo and admitting errors are viewed as opportunities for growth and improvement.

Embracing Failure to Enhance Cybersecurity Responses | Razorthorn Security

In this enlightening episode of the Razorwire Podcast, explore the transformative power of embracing failure within organizations to accelerate response times to cybersecurity threats. Learn why fostering a culture that views mistakes as learning opportunities is crucial for rapid adaptation and improvement, particularly in handling phishing attacks—the most common method used by attackers. The discussion delves into how a shift in organizational culture can dramatically reduce the average time it takes to detect and respond to breaches, currently standing at a staggering 287 days.