Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Continuous Penetration Testing: discover the Razor's Edge platform from Razorthorn

Welcome to Razor's Edge, the Continuous Penetration Testing platform from Razorthorn Security. The essence of Razorthorn’s Next-Gen Continuous Pen Testing service, Razor’s Edge, is to help find vulnerabilities, verify them and perform base level exploitation to provide organisation-specific risk scores and mitigation advice to improve the overall security of an environment. We work to a schedule of scanning, testing and reporting defined by the client for the duration of the contract length.

A Snapshot in Time Why Penetration Testing Is Critical for Cybersecurity

When Megan Brown, Jonathan Care, and I explore the world of penetration testing, we uncover the missing links between the testing itself and having a secure organisation and patched vulnerabilities. In this episode, you will learn how to maximise the potential of your penetration tests and increase the depth of your organisation's cyber security.“Pen tests on their own don’t do anything if you don’t have a way of tracking the issues, resolving the issues.”

The Evolution of the Internet: From a Fad to a Global Phenomenon

Do you remember a time before the internet? It's hard to imagine our lives without it now, but there was a time when people believed it was just a passing fad. In this video, we take a look back at the evolution of the internet and how it went from being a niche technology to a global phenomenon that has changed the way we live, work, and communicate. We explore the early days of the internet when people thought it was just a passing trend, and how it evolved into the complex and ever-evolving system we know today.

The Masterclass Series - A Tutorial in Breaking Barriers and Building Strategies

Part 1 – Attitudes toward the security community In part one of the webinar, we'll explore some of the challenges and obstacles that professionals may encounter within the information security field, including those that originate from both within and outside of the security community. By understanding these hurdles, attendees will be better equipped to navigate the complex landscape of information security and develop effective strategies for success.

The Future of Cybersecurity Legislation: Prioritizing Resilience over Deterrence

In this video, we explore the evolving landscape of cybersecurity legislation and how it has shifted towards prioritizing resilience over deterrence. As cyber threats continue to increase and attribution becomes increasingly difficult, traditional approaches to cybersecurity legislation such as deterrence and punitive measures have proven to be ineffective. Instead, we are seeing a shift towards promoting resilience and the ability to withstand attacks and quickly recover from them.

The Need for More Cybersecurity Legislation

In this video, Keith Christie-Smith shares his opinion on the current state of cybersecurity legislation and why he believes that more legislation is necessary. He argues that there are still many verticals where more legislation is needed and that organizations should be mandated to apply the most stringent cybersecurity policies and frameworks available. He also discusses the importance of organizations doing as much as possible from a cybersecurity perspective to protect themselves and their clients.

Coffee with Jim - Securing Against Supply Chain Cyber Attacks

Following the ransomware attack on US IT firm Kaseya, join us for a chat about the ever-increasing need to secure ourselves successfully against not only direct ransomware attacks, but those that affect us through our supply chains. An estimated 200+ firms have been crippled by the attack on Kaseya, simply because they use Kaseya’s software. The implication of this is that it can feasibly happen to any aspect of your supply chain, so if cyber security is not high on your board’s list of priorities, it really should be. How could the attack on Kaseya, and other supply chain attacks, have been avoided? How can you reduce the probability of it happening to your own organisation? And crucially, how can you make the solution cost effective?

Hack Your Way To Your Dream Job In Cyber Security

Part 1 – Top Tips for Job Applications Firstly this week, we’ll be addressing a question posed by one of our masterclass attendees: “I am currently studying cyber security and I would love to know what you look for in candidates?” This is a great question and the answer is critical in helping you get into cyber security – I’ll give you my top tips in the first part of our masterclass.

Strengthening Cyber Security: The Impact of Compliance and Legislation

Josh Davies, Keith Christie-Smith, and I dive into the world of legislation and compliance and explore the stark contrast between the need for rigorous security and the burden placed on businesses to comply. “One of the big problems we have in security is that you spend all this money pre-empting your defence in depth to try to protect you against things that you could perceive could happen to you." Josh Davies

The Need for a Universal Set of Information Security Regulations: Insights from Industry Experts

In this video, we discuss the importance of having a joined-up approach to information security regulations. As a believer in creating a think tank of different information security professionals from various industries and stages of their careers, we explore the benefits of having a universal set of regulations that are not set hard in stone, but rather adaptable to different companies' needs. We understand that different companies have different security measures depending on their business activities, and we aim to bring together experts to develop a comprehensive and flexible set of regulations that can be universally implemented.