Scorched Earth: Wiper Attacks are the New Face of Cyber War

Sure, they would vastly prefer targeting organizations in the opponent’s supply chain (which is why new requirements like CMMC are absolutely crucial), but every organization that is affiliated with or operates in the adversary’s territory becomes a target no matter how large or small.

What You Need to Know about the Stryker Cyberattack

Stryker Corporation is a Fortune 500 medical technology company headquartered in Kalamazoo, Michigan. Founded in 1941, Stryker manufactures surgical equipment, orthopedic implants, neurotechnology, hospital beds, and robotic surgery systems. The company employs approximately 56,000 people globally and reported over $25 billion in revenue for 2025. Stryker's products reach more than 150 million patients annually across 61 countries.

What You Need to Know about the LexisNexis Data Breach

LexisNexis Legal & Professional is a global provider of legal, regulatory, and business information used by lawyers, corporations, governments, and academic institutions. A division of RELX Group based in London, the company was founded in 1970 and is headquartered in Atlanta, Georgia. LexisNexis operates 40 offices worldwide with approximately 11,000 employees, serving customers in more than 180 countries.

Top 10 Customer Identity and Access Management (CIAM) Vendors of 2026

When someone registers for an online service or healthcare portal, logs into an eCommerce store, or uses a streaming platform, the first interaction usually involves identity and authentication. For businesses, this moment is critical because it connects security, customer experience, and trust.

The Top Industries Targeted By Deepfake Scams

Financial institutions and insurers sit at the front line of deepfake abuse, with digital onboarding, KYC, AML checks and app based claims all exposed to synthetic media. Fraudsters can fake identity documents, accident photos and invoices at scale, which pushes these sectors to rethink verification beyond simple photo uploads. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Email DLP: Everything You Need to Know

Traditionally, email data loss prevention software has used static rules to stop users from emailing sensitive or confidential data. Specifically, email DLP protects organizations from accidentally exposing sensitive data such as bank account numbers, passwords, credit card numbers, intellectual property, or trade secrets.

Proactive Insider Risk Management: The Smartest Cybersecurity Investment for 2026

One reality that organizations must accept in 2026 is that insider risk can no longer be a secondary security concern. It is a material business risk with direct implications for governance, operational resilience, and enterprise value. Source: 2025 Cost of Insider Risks Global Report by Ponemon Institute.