Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Complying with the National Cybersecurity Authority Regulations

In this session, Sangmesh Hiremath (Founder Marmin.AI) talks to Venky about how cybersecurity is a crucial driver for their business to expand and grow in Saudi Arabia, the Middle East, and European markets. He shares the steps one can take to comply for business in a country and meet cybersecurity compliance for qualifying for a contract 📄. For any SaaS business that wishes to expand its presence in the above-said markets, an investment of 20mins on this podcast can help you save three months of research on AppSec and Compliance.🔐

Automated Fuzzing | How You Can Find the Log4j Vulnerability in Less Than 10 Minutes

While most developers rely on unit testing to test whether their application behaves as expected, complementary testing approaches such as automated fuzz testing can enable them to also check their applications for unexpected or strange behaviors that could lead to crashes and make them vulnerable to Denial of Service (Dos) attacks or Zero-Day exploits, or Remote Code Execution (RCE) attacks such as the recent Log4j vulnerability.

Claire Davies on Preparing For A New Career In Cybersecurity

Claire Davies talks about her preparation for a new career in cybersecurity after being in the military. The episode gives a great guide to moving from the forces into the world of commerce from people who have been through the process themselves. Listen to this episode on your favourite podcasting platform. If you are a new listener to Razorwire, we would love to hear from you.

Threat Intelligence: The Fuel for Your Security Programs

Josh Davies shares that Threat Intelligence is essential for making your security programs successful. Just like fuel powers a car, threat intelligence drives your security efforts forward. But it's not as simple as buying a stockpile and forgetting about it. Threat intelligence is a constantly evolving force that must keep pace with the ever-changing threat landscape.

The Masterclass Series - Career Development & Incident Response

Join cyber security veteran and Razorthorn MD James Rees on Friday 3rd Feb when we will be discussing: Career Path Management Choosing a discipline and a career path is an important part of your cyber security journey. Firstly today we discuss when to do it, how to choose, baseline and specialised certifications to consider, along with tips and tricks to ensuring you effectively manage your career path.

Stalkerware Exposed | Cybersecurity Sessions #16 with Martijn Grooten

Our reliance on personal mobile devices leaves us vulnerable to attack; not just from anonymous criminal groups, but in some cases, from those closest to us. Stalkerware, a category of apps designed to secretly monitor the unsuspecting victim whose device they’re installed on, are a growing concern for security and privacy advocates, as well as law enforcement agencies.