Razorthorn

Feb 25, 2022   |  By Razorthorn
Supply chain attacks tripled in 2021, meaning a secure software development lifecycle is more important than ever. Do you know what open source software (OSS) components are in use within your organisation? Or how to find out?
Feb 4, 2022   |  By Razorthorn
We’ve all had it happen. You receive an email telling you that you’ve won a prize draw you never entered or a foreign prince wants to transfer you a huge sum of money and needs your bank details. These obvious scams can be spotted from a mile away and are what we tend to think of when we think of phishing, but it’s not always that apparent. Over the years, phishing scams have become harder to detect and many have fallen victim as a result.
Jan 11, 2022   |  By Razorthorn
Since the introduction of Bitcoin in 2009, and as a result of the global recession during that period, cryptocurrency have been a much-discussed topic across technology, finance, and even global policy. The news is dominated by stories of its impact on our lives and businesses.
Jul 2, 2021   |  By David Smith
Biometric technology, such as fingerprint sensors and voice recognition, has become widely popular in recent years with the boom in mobile applications. Organizations are now trying to make use of this technology and implement it to a wide range of areas. Particularly for the banking industry, biometrics can play a vital role in fraud prevention. With the prevalence of phone and digital banking, banks require innovative ways to authenticate their customer’s identity.
Mar 31, 2021   |  By Razorthorn
There are few books in history that are still considered to be as valuable today as when they were written and “The Art of War” is one of them. Written in 5th Century BC, it is still considered today to be essential reading in many fields, including business. It has been quoted in a ton of movies, books and media more times than you can probably count.
Oct 28, 2020   |  By Razorthorn
Biometrics has been around for a long time but has only had limited adoption until recently. I was involved in some of the early commercial biometric devices way back in 2000; the company I was working for at the time investigated the possibility of using them, but back then the false positive rates on the devices we investigated were way too high – either people could not authenticate or it was authenticating the wrong people.
May 26, 2020   |  By Razorthorn
We are entering a very different business world at the moment, one which has been thrust upon most of us far quicker than we planned for and will by all accounts last a lot longer than many of us think.
Apr 23, 2020   |  By Razorthorn
I was asked a very interesting question during an interview yesterday, and the more I think about it the more I thought it would make an interesting thought piece.
Apr 22, 2022   |  By Razorthorn
Join us for an insight into the rise of cybercrime with James Rees, MD of Razorthorn Security. Working in cyber security day in day out, we have an in depth understanding of the changes and trends in cybercrime in 2022. James shares his thoughts on what organisations need to have in place for a modern and effective defence in depth cyber security strategy to combat the current threats.
Apr 19, 2022   |  By Razorthorn
Razorthorn MD, James Rees, has been a PCI DSS QSA for much of his career - hear his initial thoughts on the latest update. Get in touch if you have any questions for him.
Apr 6, 2022   |  By Razorthorn
Razorthorn MD James Rees is joined by Andy Johnson from HighSide - experts in controlled file sharing and secure collaboration - for a discussion on what can be done to improve data security for businesses operating in security-conscious and regulated industries. Working remotely requires online collaboration with colleagues and external organisations, but when you send a file or speak via an online chat platform, you're opening up safety risks due to a lack of adequate security and encryption.
Feb 16, 2022   |  By Razorthorn
Prepping is a way of life for people all across the world - it's the practice of making active preparations for a possible catastrophic disaster or emergency, typically by stockpiling food, ammunition and other supplies. Digital prepping however, is ensuring you, your networks, data and digital assets are ready for the very real possibility of a potential future cyber attack. So... are YOU ready?
Jan 31, 2022   |  By Razorthorn
In this episode we look at the new UK Government Cybersecurity strategy taking a first pass over our thoughts on the content, what it means and an objective view of if this is the UK government's first step towards taking cyber security as seriously as it needs to.
Jan 26, 2022   |  By Razorthorn
Razorthorn Security – Education Seminar The Criticality of Scoping (created for PCI DSS London) Introduction Of all the PCI DSS project work that takes place in a PCI DSS project one of the most critical parts to undertake is a full scoping to understand the environment that will need to become PCI DSS compliant.
Jan 10, 2022   |  By Razorthorn
Join us for our roundup of cyber security in business in 2021 and our forecast of things to watch out for in 2022.
Oct 25, 2021   |  By Razorthorn
We're back from a short break while we upgraded our studio equipment - have you missed us? Today we have a quick roundup of the latest news including notes on a recent interview with a hacker - who they target and why - and what we can take from this to protect our organisations.
Aug 18, 2021   |  By Razorthorn
In the second of our new series, Spotlight on Technology, we take a look at privileged access management with James Rees MD of Razorthorn cyber security consultancy, & David Higgins, EMEA Technical Director of CyberArk, leaders in identity security and access management. Accounts with privileged access are gold dust for malicious actors and gaining access to these, and the sensitive data these accounts have access to, can cause some huge and costly problems for the targeted organisation.
Aug 16, 2021   |  By Razorthorn
In this 25 minute video, we take a look at the state of cybercrime and security from a national and regulatory standpoint. We know that there are problems with our existing cyber security - whether that's within CNI and governments or organisations, large or small. The Colonial Pipeline hack is evidence enough.

Razorthorn has a single purpose: to defend business-critical data and applications from cyber attacks and internal threats. Founded in 2007, Razorthorn has been delivering expert security consulting and testing services to some of the largest and most influential organisations in the world, including many in the Fortune 500.

Leaders in Cyber Intelligence:

  • Cyber Security Consultancy: Delivering professional and dedicated consultants to our clients, we are specialists in all areas of cyber security consulting. Whether you need help with cyber security compliance or require CISO services, we work closely with our clients to provide short term or ongoing support, in line with your requirements and budget.
  • Cyber Security Testing: It is essential to test your cyber security posture regularly, whether it’s a requirement for compliance or to ensure you are getting value for money from your cyber security solutions. In addition to pen testing, Razorthorn offer a comprehensive suite of cyber security testing services to ensure your data and business reputation is as secure as possible.
  • Managed Services: We provide 24/7 managed cyber security services, working as an extension to your in house team or as your dedicated managed services partner. You will benefit from the skills and expertise of our team, the cost efficiency and flexibility that comes with outsourcing to a specialist service provider.
  • Cyber Security Solutions: We work in partnership with hand-picked, industry leading solution providers, carefully selected for quality, effectiveness and to complement the services we offer.

Defending businesses against cyber attacks since 2007.