Cyber Resilience: The Key to Maintaining Business Operations

As a child, rubber bands almost seemed magical. They would stretch to fit a size or shape. They could be flung across a room, although not ever at another person and certainly not a sibling. Their resilience means that they would always return to their original shape after being stretched, flung, or twisted.

BlueVoyant TPRM Is Now Available on Google Cloud Marketplace

We're excited to announce that BlueVoyant's Third-Party Risk Management (TPRM) solution is now available on Google Cloud Marketplace. This milestone makes it easier than ever for organizations to purchase, deploy, and start managing supply chain cyber risk while getting more value from their existing Google Cloud Platform (GCP) investment.

Ep 35: RSAC FOMO? Dojo AI Demo

As we gear up for RSA Conference, we give viewers a sneak peek at Sumo Logic's SOC analyst agent, which turns a 45-minute analyst investigation into a five-minute AI-powered sprint. We walk through live demos showing how the agent automatically generates queries, maps threats to MITRE ATT&CK, and hands you recommended remediation actions all without making you switch tabs or tools. We also show off MCP integration that lets teams collaborate on active investigations right from Slack, because no one should be chained to their war room when there's dinner to be had.

VMware vSphere HA and DRS Compared and Explained

A VMware hypervisor allows you to run virtual machines on a single server. You can run multiple virtual machines on a standalone ESXi host and deploy multiple hosts to run more virtual machines. If you have multiple ESXi hosts connected via the network, you can migrate virtual machines from one host to another.

TeamPCP Supply Chain Attack Part 2: LiteLLM PyPI Credential Stealer

Part 1 covered CanisterWorm, the self-spreading npm worm. This post covers the next wave: a malicious LiteLLM PyPI package carrying the most capable credential stealer TeamPCP has deployed yet. On March 24, 2026, two versions of litellm, one of the most widely used Python libraries for working with AI language model APIs, were published to PyPI carrying a hidden credential stealer. Versions 1.82.7 and 1.82.8 never appeared on the official LiteLLM GitHub repository.

The Future of Intelligent SOC -- Customer Brown Bag -- March 19th, 2026

Join us as Christopher explores how to build a modern, intelligent SOC with decision-ready detection, shared adversary context, and automated response that empowers faster, more confident security operations, featuring the role of the Sumo Logic SOC Agent in streamlining investigations and accelerating response.

Gary Hibberd on InfoSec, GDPR and Owning Your Space

This episode explores why information security needs more wisdom, less noise and fewer empty promises about being “GDPR compliant.” It covers slowing down, valuing data properly, cutting through bad advice and why InfoSec professionals need to own their place as integral voices in modern organisations.  ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

100,000+ New Vulnerabilities This Year and Most Will Be Zero-Days Exploited Faster

The number of publicly reported unique vulnerabilities has risen year after year. There was a brief decrease and stabilization in 2015 - 2016, but those are the only years in the over two decades (1999 - on) I have been following vulnerability metrics. Other than that, it has been up, up, up.

Setting the Number of VMware CPU Cores Per Socket: Best Practices

When configuring processor settings for a new virtual machine, there are several key concepts to understand: how to calculate the number of processor cores per CPU and CPU cores per socket and how these settings affect the speed of virtual machines. In addition, it is important to understand what ensures better VM performance: limiting the number of processors and having more CPU cores or having more processors with fewer cores?

Why EDR and XDR are becoming essential for MSP security

Antivirus just isn’t enough anymore — not even close. Ransomware attacks constantly grow more sophisticated, zero-day vulnerabilities appear frequently and attackers increasingly rely on legitimate tools already inside a network rather than just on traditional malware. Antivirus alone just can’t protect organizations from all of those threats.