The Vendor Tiering Series: Why Tier Your Vendors

The thing about blanket approaches is that they rarely work or scale. The same holds true for third-party cyber risk management. Treating every provider, stakeholder, or partner with the same intensity is neither productive nor cost-effective. While defaulting to treating every vendor at the same risk level is common, it is not a resilient security strategy.

When Security Fails, Incident Response Decides Everything

The episode explores what happens after security fails, from inevitable incidents and one big ransomware hit away from collapse to money, media noise and decision power at 1 a.m. Viewers hear how poor planning burns cash without progress, why authority and rehearsal matter, and how psychology, struggle and resilience shape every response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Non-human identities (NHIs) explained and how to secure them

Non-human identities are the fastest-growing and least-governed identity population in most environments. Service accounts, API keys, and AI agents run without MFA, without owners, and without expiration. Traditional identity and access management (IAM) wasn't built to manage them. Without governance for discovery, ownership, and lifecycle management, stale machine credentials become attacker footholds that persist for months.

Internet Exposure as a Critical Layer of Context in Vulnerability Management

During a recent video interview, we spent time unpacking a deceptively simple question: what actually makes a vulnerability critical? Severity scores, exploitability, and asset importance all factor into the answer. But one layer of context consistently changes the urgency of a finding more than most teams expect: internet exposure. The difference between a vulnerability that exists and one that matters often comes down to whether an attacker can reach it.

Why Most Companies Don't Catch Internal Threats Until It's Too Late

Every year, businesses lose billions to threats that don't come from hackers on the other side of the world. They come from inside the building. Whether it's financial misconduct, data theft, or simple policy violations that snowball into costly incidents, internal threats are consistently one of the hardest risks to detect and manage.

The Surprising Automotive Roots of Modern Combine Harvester Technology

Where do combine harvesters get their brains from? It feels like combine technology has always been developed in-house by the various manufacturers we see today. But the truth is...many of the critical systems that run your combine harvester actually come from the automotive industry. GPS guidance systems, hydraulic components, electronic sensors...the list goes on. Plus the artificial intelligence that drives the insane automation you see in some of the newer models. Automotive technology paved the way for today's high-tech ag machinery.

Beyond Access: How Cato Measures and Manages User Risk in Real Time

On a quiet Tuesday morning, Jerry, a fictional system administrator, logged in as usual. While testing a new integration script, he visited a documentation page on an unfamiliar domain. It looked harmless and loaded without issue, but behind the scenes, Jerry’s laptop began making a series of small outbound requests to several low-reputation domains. None of these connections were malicious enough to be blocked, yet the pattern resembled early-stage domain-flux activity.

The Myth of Self-Healing Code: Why Claude Code Security Isn't Replacing Application Security

Anthropic recently launched Claude Code Security, an AI-powered vulnerability scanner that can analyze your codebase, trace data flows across files, find bugs, and even propose patches. It represents a meaningful advance in how developers can get security insights earlier in the development process. But let’s be clear: this is not a replacement for a comprehensive application security program.

30 Years of Cybersecurity Leadership. Built For What's Next.

Thirty years in cybersecurity doesn’t matter unless it changes something. Technology anniversaries often focus on looking at the past, product launches, or company milestones. But cybersecurity doesn’t reward longevity alone. It rewards outcomes, including safer organizations, stronger partners, and security models that actually work in the real world.