Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

The Concerning Lack of Transparency in Bug Bounty Programs

In this video, James Rees shares his concerns about the lack of transparency in bug bounty programs. He highlights the fact that testers are not always properly vetted or regularly checked, leaving companies unsure of who is testing their systems. He also notes that certain regions tend to have more malicious actors, raising questions about the validity of testers from those areas. This lack of transparency can be concerning for companies and users alike, and James encourages more accountability and validation measures to be put in place for bug bounty programs.

How Investing in Security Testing Can Save You Money and Reputation | Megan Brown

Megan Brown, the Head of International Sales at LogicGate, explains how investing in security testing can have a positive impact on your organization’s cyber risk, legal and compliance issues. She talks about how security testing can help you get better rates and coverage from your cyber insurance providers, as well as meet the expectations of your customers. She also discusses the changing standards of security testing and why you need to go beyond just showing your SOC 2 or ISO certifications. Watch this video to learn more about how investing in security testing can benefit your organization in multiple ways.

How Continuous Monitoring is Changing the Security Testing Landscape | Megan Brown

Megan Brown, the Head of International Sales at LogicGate, shares her insights on the emerging trend of continuous monitoring in the security testing space. She talks about how small startups are creating SaaS platforms that use AI and API connections to provide always-on testing for organizations. She also discusses the benefits and challenges of this approach and why she is curious to see how it evolves. Watch this video to learn more about how continuous monitoring is transforming the way we do security testing.

Why Penetration Testing is a Measure of Engineering Quality | Jonathan Care

Jonathan Care, a cybersecurity expert and analyst, explains why penetration testing is not just a compliance requirement, but a function of engineering quality. He challenges the traditional view of penetration testing as a separate activity and argues that it should be integrated into the development cycle. Watch this video to learn more about how security testing can help you improve your engineering solutions and reduce your risks.

How Often Should You Do a Penetration Test? | Razorthorn Security

James Rees from Razorthorn Security shares his thoughts on a LinkedIn poll that asked how often a penetration test should be performed. He reveals the results of the poll and explains why he thinks quarterly testing is the best option for most organizations. Watch this video to learn more about the benefits of regular penetration testing and how Razorthorn Security can help you with your cybersecurity needs.

Continuous Penetration Testing: discover the Razor's Edge platform from Razorthorn

Welcome to Razor's Edge, the Continuous Penetration Testing platform from Razorthorn Security. The essence of Razorthorn’s Next-Gen Continuous Pen Testing service, Razor’s Edge, is to help find vulnerabilities, verify them and perform base level exploitation to provide organisation-specific risk scores and mitigation advice to improve the overall security of an environment. We work to a schedule of scanning, testing and reporting defined by the client for the duration of the contract length.

A Snapshot in Time Why Penetration Testing Is Critical for Cybersecurity

When Megan Brown, Jonathan Care, and I explore the world of penetration testing, we uncover the missing links between the testing itself and having a secure organisation and patched vulnerabilities. In this episode, you will learn how to maximise the potential of your penetration tests and increase the depth of your organisation's cyber security.“Pen tests on their own don’t do anything if you don’t have a way of tracking the issues, resolving the issues.”

The Evolution of the Internet: From a Fad to a Global Phenomenon

Do you remember a time before the internet? It's hard to imagine our lives without it now, but there was a time when people believed it was just a passing fad. In this video, we take a look back at the evolution of the internet and how it went from being a niche technology to a global phenomenon that has changed the way we live, work, and communicate. We explore the early days of the internet when people thought it was just a passing trend, and how it evolved into the complex and ever-evolving system we know today.

The Masterclass Series - A Tutorial in Breaking Barriers and Building Strategies

Part 1 – Attitudes toward the security community In part one of the webinar, we'll explore some of the challenges and obstacles that professionals may encounter within the information security field, including those that originate from both within and outside of the security community. By understanding these hurdles, attendees will be better equipped to navigate the complex landscape of information security and develop effective strategies for success.

The Future of Cybersecurity Legislation: Prioritizing Resilience over Deterrence

In this video, we explore the evolving landscape of cybersecurity legislation and how it has shifted towards prioritizing resilience over deterrence. As cyber threats continue to increase and attribution becomes increasingly difficult, traditional approaches to cybersecurity legislation such as deterrence and punitive measures have proven to be ineffective. Instead, we are seeing a shift towards promoting resilience and the ability to withstand attacks and quickly recover from them.