The CEO Who Handled a Cyber Crisis Perfectly

A banking incident early in one career showed what good leadership looks like, with senior executives handing over a credit card, arranging food, hotel rooms and proper shift rotations. Instead of demanding updates every five minutes, leadership shielded the team from pressure, supported rest cycles and focused on helping the business survive. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

9 New Innovations. One Trust Layer.

The software supply chain is no longer just about shipping code, it is about managing intelligence and risk. As DevOps, DevSecOps, DevGovOps and AI/ML practices converge into a single AI-driven and increasingly agentic delivery pipeline, the demands on development and security teams have reached a new level. The platform that once managed packages and artifacts now governs models, agents, and skills at enterprise scale, speed, and accountability.

From Agentic Risk to Agentic Confidence: The JFrog MCP Registry is GA

In an AI-native world where Model Context Protocol (MCP) is the universal standard for AI connectivity, the security and governance stakes have never been higher. AI’s ability to take autonomous action through MCPs means that a single breach of an MCP server can grant attackers control over mission-critical enterprise systems, putting enterprises in an immediate and escalating state of agentic risk that cannot be ignored.

RMM AI tools: Choosing AI-powered RMM software for MSPs and IT teams

Modern managed service providers (MSPs) are increasingly adopting RMM AI tools — remote monitoring and management software enhanced with artificial intelligence — to keep pace with growing IT demands. Traditional RMM platforms allow MSPs to remotely monitor client endpoints, deploy patches, run scripts and troubleshoot issues from a central console. Now, AI-powered RMM software is taking this a step further.

Is Your Jira Instance Quietly Becoming a Data Liability?

Jira silently accumulates PII, credentials, and sensitive data through everyday team use. Security and compliance teams can detect and remediate this exposure using miniOrange's DLP PII Scanner, which scans historical and real-time content without disrupting workflows. There's a moment every security or compliance professional dreads. It's not a dramatic breach. It's quieter than that.

Is Wix Secure Enough? Understanding the Next Layer of Protection for Growing Websites

You click “Publish” on your Wix site and breathe easy. HTTPS? Check. Automatic updates? Check. Hosting handled? Check. Your website feels bulletproof. But here is the catch: security is not static and neither is your website. Every new feature, integration, and user interaction opens a door, sometimes one you didn’t even know existed. Hackers are constantly scanning, probing, and testing sites like yours. They don’t care if you are small; they care only about finding a weak spot.

Spotlight Report: Cyber Resilience and Business Impact in US SLED for 2026

Threat groups are uniquely open-minded when selecting their targets. They may issue platitudes about avoiding schools or critical infrastructure, but data from LevelBlue’s just-released Spotlight Report: Cyber Resilience and Business Impact in US SLED shows this is, unsurprisingly, false. The threat actors' broad-minded approach means public sector security teams have to be as prepared as any financial institution or healthcare facility.

CrowdStrike Innovates to Modernize National Security and Protect Critical Systems

At Fal.Con Gov 2026, CrowdStrike is introducing new innovations to accelerate modernization and strengthen cyber defense of government systems, while helping agencies meet some of the most rigorous compliance standards within a FedRAMP-authorized environment. Cybersecurity is national security. Ransomware threatens public safety and continuity of operations. Supply chain compromise multiplies impact. Nation-state actors target critical infrastructure for strategic disruption.

Unlock AI with GPU as a Service in VCF 9

Many IT professionals struggle to integrate artificial intelligence (AI) into their existing environments. You often find expensive hardware trapped in isolated clusters or dedicated hosts. Your infrastructure team manages access through manual ticket queues, which leads to low utilization and frustrating bottlenecks for developers. When you don’t have a standardized way to share and monitor accelerator resources, every hardware change risks downtime for your critical applications.

The Essential Eight: The Foundation of Australian Compliance

The Australian Signals Directorate (ASD) is the overarching agency that incorporates the Australian Cyber Security Centre (ACSC), the government’s technical cybersecurity authority. In 2018, the ASD became a statutory agency, assuming responsibility for the Computer Emergency Response Team Australia and the Digital Transformation Agency.