Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Embracing Agility The Key to Survival and Success in a Changing World || Razorthorn Security

Join us as we explore the essence of agility in navigating the ever-evolving landscape of technology, industries, and careers. In this video, we delve into the importance of being adaptable and open-minded, emphasizing the value of flexibility over rigid adherence to a single approach or mindset. Drawing inspiration from evolutionary principles and successful innovators like Madonna and David Bowie, we uncover the significance of embracing change and continuously innovating. Discover how adopting an agile mindset can lead to greater success and resilience in the face of challenges.

Cybersecurity: From Government to Consumer Unveiling Key Meta Patterns for the Future #podcast

Explore the evolving landscape of cybersecurity in this insightful video, where we delve into its pervasive importance across government services, healthcare, consumer realms, and beyond. Join us as we highlight the heightened attention and investment in cybersecurity, recognizing meta patterns such as agility, modularity, and enhanced interoperability among cyber technologies. Discover how these overarching themes shape the future of cybersecurity strategy and implementation.

Unlocking Competitive Edge: Leveraging Cybersecurity and Privacy Protection in Retail #podcast

Discover how cybersecurity and privacy protection have become pivotal elements in gaining a competitive edge, especially for organizations like retailers. In this video, we explore the significance of building trust with both customers and employees by demonstrating robust security measures in handling sensitive data. Learn how prioritizing cyber and privacy protection can set businesses apart and strengthen their reputation in the marketplace.

Heightened Awareness: The Growing Importance of Cybersecurity in Today's World | Razorthorn Security

Join us as we explore the evolving landscape of cybersecurity and the growing emphasis on it in recent years. From protecting personal identity to countering threats from hackers and nation-states, cybersecurity has become a top priority for individuals and organizations alike. Explore how heightened awareness has led to greater investment in cybersecurity technologies and strategies, reshaping the way we interact with digital security in today's interconnected world.

Exploring the Complexity of Cyber Maturity Measurement Insights from the Two Types of Organizations

In this thought-provoking video, we tackle the formidable challenge of measuring cyber maturity within organizations. With a poignant quote attributing two types of organizations - those cognizant of their cyber breaches and those oblivious - we delve into the intricacies of this digital landscape. It's an exploration of the harsh reality that virtually every entity, particularly large enterprises, faces cyber threats, emphasizing the prevalence of intrusions even in seemingly secure networks. As we unravel the complexities of cyber resilience, we confront the sobering realization that insurance may not offer a panacea in safeguarding against cyber risks. Join us on this insightful journey as we navigate the turbulent waters of cybersecurity, offering insights and strategies for fortifying organizational defenses in an ever-evolving threat landscape.

Unraveling the Third-Party Supplier Web: Managing Generational Complexity || Razorthorn Security

In this video, we dive into the intricate layers of third-party supplier networks, transcending the immediate concerns of dealing with organizations to confront the complexities of second, third, and even fourth generations of suppliers. Join us as we navigate through the evolving landscape of supplier relationships and explore strategies for managing the labyrinthine "mishmash" of third-party involvement.

The Expanding Web of Organizational Supply Chains and Security Risks || Razorthorn Security

In this video, we delve into the intricate web of organizational supply chains and the heightened complexities they bring to the realm of cybersecurity. With the interconnected nature of modern businesses, from retailers to manufacturers to insurers, the reliance on numerous other entities introduces a myriad of potential vulnerabilities. Join us as we explore the evolving landscape of malicious activities and data breaches, highlighting the exponential growth in complexity over the past two decades.

Cyber Trends in Identity and Access Management with Simon Moffatt || Razorthorn Security

Hello Razorwire listeners! It's your host Jim here, and in today's fascinating episode, we sit down with cybersecurity veteran Simon Moffatt. With two decades under his belt in the dynamic field of identity and access management, Simon unpacks the complexities of cyber protection in our modern age. From the evolution of technology to the murky waters of liability and insurance in cybersecurity, Simon's insights shed light on the challenges and trends we face.

Unlocking Security: MFA vs. Passwords | Navigating Compliance Challenges || Razorthorn Security

Ditching passwords for a more secure future with Multi-Factor Authentication (MFA)! Explore the realm of technical feasibility and compliance requirements. Discover why it's crucial to go beyond the words and address the true intent of security measures. Join the conversation as we delve into the legal intricacies hashed out in court. Don't miss this insightful discussion on revolutionizing your approach to online security!

Decoding Cybersecurity: Pipelines vs. Power Grid | Unveiling the Unique Challenges in Legislation

Dive into the fascinating realm of cybersecurity with our latest exploration, as we dissect the historical focus on electricity grids versus the unique challenges posed by pipelines. Traditionally, issues on the electricity grid have captured immediate attention, often portrayed in Hollywood hacking scenes with dramatic attempts to switch off lights. However, the landscape shifts when it comes to pipelines.