Meet Exabeam Sherpa: The AI Backbone of Our NextGeneration Partner Experience

Today’s partners don’t need more portals, more PDFs, or more one‑time training sessions. They need momentum. That’s why we built Exabeam Sherpa, an AI‑powered, always‑on virtual Channel Account Manager (CAM) designed to help partners ramp faster, sell smarter, and scale performance as their teams grow.

Tough Times Create Tough People, Easy Times Create

Rising anxiety around decision making worries many leaders, as younger professionals fear choices that might come back to hurt their careers. The conversation argues that some struggle and hard calls build resilience, because security work often means choosing a path with partial data and then learning fast when reality hits. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Proactive Threat Management Strategies for Modern Cybersecurity

Businesses are under increasing pressure to protect their digital assets as cyber threats continually evolve. Threat management is now an important part of modern cybersecurity because it enables companies to detect, mitigate, and respond to threats in real time. Effective advanced threat protection not only reduces risk but also makes businesses more resilient, ensuring operations remain secure and uninterrupted.

DoD IL4 and IL5 Authorization Guide - Requirements and Readiness

One of the core pillars of the security perspective adopted by the Department of Defense is the so-called Zero Trust strategy. This strategy is the adaptation to evolving threats in the world, many of which prey on the presumption of trust from accounts and individuals that can be compromised. To protect controlled unclassified information and other sensitive data, the presumption of zero trust is necessary to eliminate many common threats.

Has AI structurally changed the cyber industry forever? #cybersecurity #podcast #ai

On this week's episode of The Cybersecurity Defenders Podcast, Stel Valavanis, founder of onShore Networks, argues that AI is a significant milestone but does not change where security is headed. He puts AI alongside the Internet and TCP/IP and makes the case that the path forward is clear: fully embrace it as a tool, regardless of which side of the equation you are on. He also points out that agentic and automated AI was already being deployed well before LLMs arrived.

Moonshot AI governance breakdown: Lessons from the Cursor/Kimi K2.5 incident

What happens when a $29 billion company forgets to rename a model ID, and what it means for every organization using open-source AI. On March 19, 2025, Cursor, the AI-powered coding tool valued at $29 billion and generating an estimated $2 billion in annual recurring revenue, launched Composer 2, its newest and most powerful coding model.

Why NER models fail at PII detection in LLM workflows - 7 critical gaps

In AI systems, PII detection is the first step. Not the most glamorous step. But the one that, when it fails, takes everything else down with it. Identifying sensitive data (names, Social Security numbers, financial records, health information) has to happen before any of it reaches an LLM. Get this wrong, and you’re looking at one of two bad outcomes: Traditional DLP systems could afford to be aggressive with detection. LLMs can’t. They depend on full context to generate correct outputs.