|
By Razorthorn
By James Rees, MD, Razorthorn Security From 2020 to 2024, cybersecurity underwent a transformative period that reshaped the industry. This era witnessed several significant high profile security breaches, whilst the World Economic Forum recognised cybersecurity as one of the top ten threats to global economic stability.
|
By Razorthorn
By James Rees, MD, Razorthorn Security The landscape of cybersecurity awareness has changed dramatically in the last 25 years. What began as simple password guidance and basic IT training has evolved into a complex web of security challenges that organisations must navigate daily. Back in December 1999, the world held its breath waiting for the Y2K bug to wreak havoc on computer systems globally.
|
By Razorthorn
By James Rees, MD, Razorthorn Security Human-related security failures are rarely about incompetence. Most organisations view security as a problem to be solved through training modules, awareness campaigns and strict policies, yet beneath this mechanical approach lies a deeper truth: our relationship with security at work mirrors our basic human needs for safety, belonging and professional dignity.
|
By Razorthorn
By James Rees, MD, Razorthorn Security In an era of interconnected services and external partnerships, two critical security challenges loom large: third party risk and insider threats. Recent events highlight these concerns – from the massive breach of Social Security numbers through a service provider to the CrowdStrike incident that grounded major airlines, causing hundreds of millions in damages.
|
By Razorthorn
By James Rees, MD, Razorthorn Security In today’s complex cybersecurity landscape, Governance, Risk and Compliance (GRC) tools have become essential for organisations managing intricate security ecosystems. These tools are designed to centralise information, streamline processes and offer crucial insights into an organisation’s risk posture. However, as cybersecurity expert Jack Jones revealed when he joined me on a recent podcast, the reality often falls short of these ambitious claims.
|
By James Rees
The cybersecurity industry is known for its cutting edge technology and constant evolution, but beneath the surface of firewalls and threat detection lies a aspect that’s discussed less regularly: the mental health and wellbeing of its professionals. As cyber threats grow more sophisticated, so too does the pressure on those tasked with defending against them.
|
By Razorthorn
By James Rees, MD, Razorthorn Security In the rapidly evolving world of cybersecurity, artificial intelligence (AI) and large language models (LLMs), have become buzzwords that seem to promise revolutionary solutions. However, as with any emerging technology, it’s crucial to separate hype from reality.
|
By Razorthorn
By James Rees, MD, Razorthorn Security Times must change (and always will) and nowhere is this more true than in the realm of technological advancement. Thirty years ago, the technological landscape was vastly different from what we have today and technological change has outpaced Moore’s Law for some time now. Information security must keep pace with these advancements. This has become especially true with the advent of AI.
|
By Razorthorn
By Michael Aguilera, Lead Penetration Tester, Razorthorn Security Over the past decade, crowdsourced penetration testing has grown in popularity because of its convenience and cost effectiveness. However, this surge in popularity does not come without its caveats. In this blog, we’ll explore the benefits and risks of crowdsourced penetration testing, compare it with traditional methods and help you make an informed decision for your organisation’s cybersecurity needs.
|
By Jamie Hayward
The Digital Operational Resilience Act (DORA) is set to reshape the landscape of financial services in the European Union. But its impact extends beyond EU borders, particularly affecting UK-based Information and Communication Technology (ICT) service providers. Let’s explore how DORA might influence these providers and what steps they should consider taking.
|
By Razorthorn
Snapshot pen testing is outdated. Discover why IT departments are moving towards ongoing security baseline testing to adapt to evolving threat landscapes.
|
By Razorthorn
Incident management, training, continuous improvement, vendor risk, and physical security—learn why these are the top priorities for any effective InfoSec strategy.
|
By Razorthorn
Should every department contribute 10% of its budget to security? Discover a decentralised model for assigning budgets with InfoSec professionals guiding the strategy.
|
By Razorthorn
Are vendors driving cybersecurity certifications for profit? Learn why schemes like DORA can mislead organisations into relying on products rather than strategy.
|
By Razorthorn
Why are organisations wasting budgets on tools they don't implement properly? Discover the value of hiring InfoSec strategists to optimise cybersecurity spending.
|
By Razorthorn
Ever wonder how to get the most out of your cybersecurity budget without leaving your company vulnerable? Hey there, it’s Jim from Razorwire! In this episode, I sit down with cybersecurity pros Chris Dawson and Iain Pye to chat about smart spending when it comes to your cybersecurity budget. Whether you’re a big enterprise with a hefty budget or a small business wanting maximum impact on a small budget, we’ve got some actionable insights for you. Summary In this episode, we tackle one of the industry's most pressing challenges - how organisations allocate and manage their cybersecurity spending.
|
By Razorthorn
Explore how cybersecurity has become a top priority for IT spending, with 65% of budgets now allocated to securing organisational infrastructure globally.
|
By Razorthorn
Learn why improving a company’s cybersecurity maturity is a gradual process, and how CISOs can navigate the risks along the way.
|
By Razorthorn
Discover how CISOs can present cyber risk metrics to boards in the context of financial, reputational, and operational business risks.
|
By Razorthorn
Comparing the ancient role of preventing solar eclipses to the CISO’s mission of preventing breaches, this clip highlights the evolving perspective on resilience over prevention.
- January 2025 (8)
- December 2024 (16)
- November 2024 (8)
- October 2024 (17)
- September 2024 (16)
- August 2024 (20)
- July 2024 (19)
- June 2024 (13)
- May 2024 (20)
- April 2024 (24)
- March 2024 (18)
- February 2024 (17)
- January 2024 (16)
- December 2023 (21)
- November 2023 (20)
- October 2023 (15)
- September 2023 (23)
- August 2023 (17)
- July 2023 (19)
- June 2023 (24)
- May 2023 (19)
- April 2023 (10)
- March 2023 (21)
- February 2023 (23)
- January 2023 (1)
- December 2022 (2)
- November 2022 (13)
- October 2022 (4)
- September 2022 (1)
- August 2022 (3)
- July 2022 (4)
- June 2022 (2)
- April 2022 (3)
- February 2022 (3)
- January 2022 (4)
- October 2021 (1)
- August 2021 (2)
- July 2021 (3)
- June 2021 (5)
- May 2021 (5)
- April 2021 (1)
- March 2021 (1)
- October 2020 (1)
- May 2020 (1)
- April 2020 (1)
Razorthorn has a single purpose: to defend business-critical data and applications from cyber attacks and internal threats. Founded in 2007, Razorthorn has been delivering expert security consulting and testing services to some of the largest and most influential organisations in the world, including many in the Fortune 500.
Leaders in Cyber Intelligence:
- Cyber Security Consultancy: Delivering professional and dedicated consultants to our clients, we are specialists in all areas of cyber security consulting. Whether you need help with cyber security compliance or require CISO services, we work closely with our clients to provide short term or ongoing support, in line with your requirements and budget.
- Cyber Security Testing: It is essential to test your cyber security posture regularly, whether it’s a requirement for compliance or to ensure you are getting value for money from your cyber security solutions. In addition to pen testing, Razorthorn offer a comprehensive suite of cyber security testing services to ensure your data and business reputation is as secure as possible.
- Managed Services: We provide 24/7 managed cyber security services, working as an extension to your in house team or as your dedicated managed services partner. You will benefit from the skills and expertise of our team, the cost efficiency and flexibility that comes with outsourcing to a specialist service provider.
- Cyber Security Solutions: We work in partnership with hand-picked, industry leading solution providers, carefully selected for quality, effectiveness and to complement the services we offer.
Defending businesses against cyber attacks since 2007.