Feb 25, 2022   |  By Razorthorn
Supply chain attacks tripled in 2021, meaning a secure software development lifecycle is more important than ever. Do you know what open source software (OSS) components are in use within your organisation? Or how to find out?
Feb 4, 2022   |  By Razorthorn
We’ve all had it happen. You receive an email telling you that you’ve won a prize draw you never entered or a foreign prince wants to transfer you a huge sum of money and needs your bank details. These obvious scams can be spotted from a mile away and are what we tend to think of when we think of phishing, but it’s not always that apparent. Over the years, phishing scams have become harder to detect and many have fallen victim as a result.
Jan 11, 2022   |  By Razorthorn
Since the introduction of Bitcoin in 2009, and as a result of the global recession during that period, cryptocurrency have been a much-discussed topic across technology, finance, and even global policy. The news is dominated by stories of its impact on our lives and businesses.
Jul 2, 2021   |  By David Smith
Biometric technology, such as fingerprint sensors and voice recognition, has become widely popular in recent years with the boom in mobile applications. Organizations are now trying to make use of this technology and implement it to a wide range of areas. Particularly for the banking industry, biometrics can play a vital role in fraud prevention. With the prevalence of phone and digital banking, banks require innovative ways to authenticate their customer’s identity.
Mar 31, 2021   |  By Razorthorn
There are few books in history that are still considered to be as valuable today as when they were written and “The Art of War” is one of them. Written in 5th Century BC, it is still considered today to be essential reading in many fields, including business. It has been quoted in a ton of movies, books and media more times than you can probably count.
Oct 28, 2020   |  By Razorthorn
Biometrics has been around for a long time but has only had limited adoption until recently. I was involved in some of the early commercial biometric devices way back in 2000; the company I was working for at the time investigated the possibility of using them, but back then the false positive rates on the devices we investigated were way too high – either people could not authenticate or it was authenticating the wrong people.
May 26, 2020   |  By Razorthorn
We are entering a very different business world at the moment, one which has been thrust upon most of us far quicker than we planned for and will by all accounts last a lot longer than many of us think.
Apr 23, 2020   |  By Razorthorn
I was asked a very interesting question during an interview yesterday, and the more I think about it the more I thought it would make an interesting thought piece.
Sep 1, 2022   |  By Razorthorn
In this episode of Spotlight on Technology we’re joined by Marie Hargraves, Cyber Workforce Advisor at Immersive Labs, to discuss crisis simulation and incident response testing. What would you do if your organisation was the subject of a cyber attack? Having an incident response procedure is critical, but even if you have one, how can you be sure it will work? How can the process be refined? Marie talks to us about the challenges facing businesses when it comes to incident response, and how these challenges can be overcome to ensure there is a robust plan in place if the worst should happen.
Aug 30, 2022   |  By Razorthorn
- Machine Learning, AI & Cyber Security Part 2: Malicious Actors Welcome to a new episode of the Razorwire Podcast! Welcome to part two of our episode on Machine Learning, AI and Cyber Security. In part one, we discussed what it will be like for us as security professionals when we have access to AI tools, what we are doing with them now and how we could use them in future. In part two, we are re-joined by our guests Oliver Rochford of Securonix and Jonathan Care, a mentor of mine who specialises in cyber security and fraud detection.
Aug 16, 2022   |  By Razorthorn
Welcome to another episode of Razorwire Podcast! We are joined today by Oliver Rochford of Securonix and Jonathan Care, a mentor of mine who specialises in cyber security and fraud detection. As AI and its application in cyber security are such a big topic, this podcast will be in two parts. We will discuss machine learning and artificial intelligence for information security in the first part of our discussion today.
Aug 11, 2022   |  By Razorthorn
Welcome to another edition of Spotlight on Technology! In this episode, we’re joined by Tim Keeler, Founder and CEO of Remediant, to discuss using identity management and privileged access management as part of your defence in depth strategy. Stolen account credentials are one of the most common attack vectors for malicious actors. If a hacker uses the credentials of a user with privileged access, it could be game over for that company within a matter of minutes.
Jul 5, 2022   |  By Razorthorn
Welcome to another episode of Razorwire Podcast! In this episode, our guests are Oliver Rochford of Techcron, who you've met in earlier episodes, and Stefania Chaplain, a solutions architect, discussing the skills shortage, burnout in cyber careers, and remote working. Cybersecurity offers both rewards and challenges simultaneously. Security providers in their early careers struggle to find work, while recruiters struggle to find the proper role and qualification for their security needs as cybersecurity is a multifaceted field.
Jul 5, 2022   |  By Razorthorn
Welcome to another episode of Razorwire Podcast! There is no doubt that the world has gone through massive changes over the past few years. We have faced pandemics, lockdowns, wars, supply chain issues and economic crises. As the whole world moves online, large scale innovations have been boosted. To infosec enthusiasts, this raises an interesting question: what is in store for the industry?
Jul 5, 2022   |  By Razorthorn
One legacy from Covid 19 that’s here to stay is working from home. Staff love it as it gives them flexibility, and organisations save on infrastructure costs. Still, the transition into the digital world is not smooth and comes with many vulnerabilities and risks.
Jul 5, 2022   |  By Razorthorn
Welcome to Razor Wire Podcast! In this episode, we’re joined by Claire Davies of Arriva and Keith Christie-Smith of Claroty to discuss where a CISO fits best within an organisation, a bit of the history behind it, where trends have been in recent years, and where we think it’ll going to be in future. The role of CISO has traditionally been a part of IT and they often report to the CIO. This trend has been steadily changing over recent years, but the question remains: where should the CISO sit within an organisation? With security events increasing in cost and complexity, is it time that the CISO should sit on the board? Claire, Keith and cyber security consultancy MD James Rees - your host - share their opinions on the subject from the perspective of a CISO currently in the role and with insights from an Accounts Director who deals with CISOs from multiple companies across a wide range of different sectors. The format of our show is a group of us sitting here talking like we are down the pub talking about what we do for a living. So I am inviting you to join us in this episode to learn about CISO. Listen to this episode on your favourite podcasting platform.
Jun 30, 2022   |  By Razorthorn
Today in our Spotlight on Technology, we look at Managed Detection and Response (MDR) with James Rees (Managing Director) of Razorthorn joined by Josh Davies (Technical Product Marketing Manager) of Alert Logic, leaders in Managed Detection and Response.
Jun 6, 2022   |  By Razorthorn
Today we are talking all things GRC with Megan Brown at LogicGate, including why it's essential to have a robust GRC tool in a modern security stack. GRC is extremely useful for compliance framework management and maintaining compliance - it can be used effectively to supply a historical database of known risks, issues and security measures that can be used to continuously improve security intelligence. Join Megan and Razorthorn MD James Rees to find out how a good GRC tool can save you both time and money, while efficiently improving your security and compliance.

Razorthorn has a single purpose: to defend business-critical data and applications from cyber attacks and internal threats. Founded in 2007, Razorthorn has been delivering expert security consulting and testing services to some of the largest and most influential organisations in the world, including many in the Fortune 500.

Leaders in Cyber Intelligence:

  • Cyber Security Consultancy: Delivering professional and dedicated consultants to our clients, we are specialists in all areas of cyber security consulting. Whether you need help with cyber security compliance or require CISO services, we work closely with our clients to provide short term or ongoing support, in line with your requirements and budget.
  • Cyber Security Testing: It is essential to test your cyber security posture regularly, whether it’s a requirement for compliance or to ensure you are getting value for money from your cyber security solutions. In addition to pen testing, Razorthorn offer a comprehensive suite of cyber security testing services to ensure your data and business reputation is as secure as possible.
  • Managed Services: We provide 24/7 managed cyber security services, working as an extension to your in house team or as your dedicated managed services partner. You will benefit from the skills and expertise of our team, the cost efficiency and flexibility that comes with outsourcing to a specialist service provider.
  • Cyber Security Solutions: We work in partnership with hand-picked, industry leading solution providers, carefully selected for quality, effectiveness and to complement the services we offer.

Defending businesses against cyber attacks since 2007.