Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Office to Remote: Adapting Endpoint Security Strategies

As remote work becomes the norm, organisations face new challenges in securing devices outside the office. This clip discusses the return to host-based security and the importance of robust endpoint security measures backed by logs and alerts. Learn how to adapt your security strategies for remote environments where device locations are unknown.

Remote Work Security: Trusting Employees and Protecting Data

With the rise of remote work, ensuring that employees are actually working from secure locations is more crucial than ever. This clip discusses the trust issues and risks associated with employees working from unapproved locations, highlighting the need for robust IT asset management and security protocols to protect sensitive data.

Trust and Control in Third-Party Audits: Navigating the Challenges

This clip explores the delicate balance between trust and control in managing third-party vendors. With only large corporations often able to conduct thorough audits, many organisations must rely on paper audits and trust the provided responses. Understand the limitations and strategies for ensuring security when physical audits aren't feasible.

Balancing Trust and Control: Effective Phishing Protection Strategies

Discover why balancing trust and control is essential in cybersecurity. Our hosts discuss the complexities of protecting against phishing attacks, especially with advanced tools like ChatGPT that make scams harder to detect. Learn how combining trust with effective controls can help detect anomalies and safeguard your organisation against targeted attacks.

User Training vs. Security Controls: Who's to Blame for Phishing Attacks?

In this thought-provoking clip, the hosts debate whether security awareness training is enough to prevent users from falling for phishing scams or if stronger controls are necessary. Drawing on insights from a recent NCSC blog, they explore the ethical dilemma of assigning blame when users, despite training, click on malicious email attachments. Should the onus be on the end user, or is it a failure of security controls? Tune in to understand the complexities of balancing trust and control in cybersecurity.

Trust vs Control - Is Zero Trust Inevitable?

Welcome back to Razorwire, the podcast slicing through the tangled world of cybersecurity! I'm your host, Jim and in this episode we’re talking about the crucial balance between trusting your workforce and exerting control over your security ecosystem. Joining me are Iain Pye, sharing his insights into privacy roles, and David Higgins from CyberArk, who will discuss the challenges and strategies of effective cybersecurity. Whether you're managing remote teams or integrating third party services, this episode is packed with expert analysis and actionable advice.

Why Trust Alone Isn't Enough in Cybersecurity: The Need for Control

In this insightful clip, our host delves into the common misconception that trust in suppliers and staff is sufficient for cybersecurity. Highlighting the adage 'trust is good, but control is better,' the discussion emphasises the necessity of implementing robust controls to detect and manage breaches of trust. Learn why regular assessments and monitoring are critical to safeguarding your organisation from potential failures in this must-watch segment.

AI Awareness Gap: Bridging the Disconnect Between Tech Experts and the Public | Razorthorn Security

Amy Stokes-Waters sheds light on the disconnect between technology enthusiasts and the general public's interest in tech, specifically AI advancements. In this engaging clip, Amy discusses the challenge of communicating complex tech concepts, like AI-generated content, to those outside the IT sphere. She emphasizes the need for better education on technologies that are reshaping our media landscape. Dive into this discussion to understand why simplifying tech talk is essential for broader awareness and acceptance.

Unrealistic Cybersecurity Job Expectations: The Talent Gap Issue | Razorthorn Security

Amy Stokes-Waters critiques the unrealistic expectations in cybersecurity job descriptions, highlighting a significant industry challenge. Discover why demanding expertise in both SOC operations and pen testing for a single role, with insufficient compensation, exacerbates the talent gap. This clip exposes the harsh realities of the cybersecurity job market and the need for more realistic hiring practices to attract and retain skilled professionals.

The Evolving Perception of Cybersecurity: A Funding Gap Analysis | Razorthorn Security

Join Amy Stokes-Waters as she discusses the significant shifts in how cybersecurity is perceived over the last five years, highlighting a persistent challenge in funding. Despite spending $450 billion on information security, the scale of criminal activity, valued at $9.5 trillion, suggests a dire need for increased investment. This clip explores the financial discrepancies and emphasizes why robust funding is crucial to effectively combat cyber threats.