Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Build Effective & Affordable Cyber Defences for SMEs

How can small and medium businesses protect themselves from cyber threats without spending a fortune or just ticking boxes for compliance? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, we’re taking a look into the challenges faced by SMEs on the journey through cybersecurity compliance and insurance.

Why Every Tech Company is Talking About OWASP for AI (and You Should Too)

AI is changing everything—but with innovation comes new risks. In this episode of AI on the Edge, we dive deep into OWASP's Top 10 for Large Language Models with security leader Steve Wilson (Exabeam). Discover why every tech company is suddenly talking about LLM security and how you can stay ahead. Inside this episode: Why traditional security doesn’t work for AI Learn from Steve’s new book The Developer’s Playbook for LLM Security and get actionable tips to protect your AI systems.

Agentic Controls for an Agentic World: Why Traditional Security Can't Keep Up

AI agents now move data, collaborate, and make decisions at machine speed — millions of actions per second. But our entire security architecture was built for humans, not for autonomous AI. In this new Agentic World, every action is faster, every breach more invisible, and every compliance gap more dangerous. Protecto introduces Agentic Controls — intelligent, context-aware CBAC Agents that live inside AI workflows. They understand policies written in plain English, enforce zero-trust decisions before data ever leaves its boundary, and protect privacy across industries.

The Invisible Threat: How Polymorphic Malware is Outsmarting Your Email Security

Approximately $350 million in preventable losses stem from polymorphic malware, a malicious software virus that constantly changes its code to evade detection. With 18% of new malware using adaptive techniques that challenge traditional defenses, now is the time to enhance your organization's security posture. James McQuiggan, CISO Advisor at KnowBe4, shares valuable insights and proactive strategies to defend against polymorphic malware attacks. You'll discover.

More Regulatory Scrutiny Means IRR Must Be a Priority | SEC, NIS2, and CIRCIA Compliance Insights

As global cybersecurity regulations tighten, security leaders are under increasing pressure to demonstrate strong Incident Readiness and Response (IRR). New requirements like the SEC cybersecurity disclosure rules, the EU’s NIS 2 Directive, and the forthcoming CIRCIA mandate faster reporting, stronger governance, and greater accountability. In this session, LevelBlue experts share insights from a survey of 500 security leaders on how organizations are adapting their IRR strategies for today’s regulatory climate.

"Trust in AI Starts with Transparency | Sebastian Goodwin (Autodesk) x Reach Security"

Trust in AI starts with transparency. In our recent conversation, “No Time to Drift,” Sebastian Goodwin, Chief Trust Officer at Autodesk, shares how his team is putting that principle into practice — by creating AI Transparency Cards. Think of them like nutrition labels for AI: clear, consistent, and designed to help customers understand what’s inside. Each one outlines what the model does, how it’s trained, safeguards in place, and more.