SafeBreach's Evolution into an AI-First Development Team: Part I

In this first installment of a series on the transformation of SafeBreach’s development organization, VP of Development Yossi Attas outlines how his team is managing the strategic shift toward an AI-First development methodology. This includes moving beyond simple tool adoption to a fundamental redefinition of the software engineer’s role. Read on as we explore.

Permission to Ignore: Leveraging the CTEM Framework to Focus on Real Risk

Security frameworks have always had a gap. They tell you to find vulnerabilities and fix them, but they’ve rarely provided a system to determine which ones actually matter before you tap into your most expensive resource: engineering time. CTEM changes the game by treating security as a continuous lifecycle rather than a series of silos.

How AI is Reshaping Cyber Threats

In Episode of Guardians of the Enterprise, Ashish Tandon, Founder & CEO, Indusface, spoke with Madhur Joshi, CISO at HDB Financial Services (part of the HDFC Group), about how AI is reshaping the cyber threat landscape. They discussed how attackers are now leveraging AI to launch more sophisticated phishing campaigns, automate malware, and scale attacks faster than ever before. As AI lowers the barrier to entry, the speed and complexity of attacks continue to increase, making it harder for organizations to keep up.

Log Collector Deployment via the Falcon Sensor in Falcon Next-Gen SIEM

See how CrowdStrike Falcon Next-Gen SIEM enables security teams to deploy log collectors instantly via the Falcon Sensor—without relying on traditional software distribution processes. In this demo, you’ll learn how to create a Log Collector Policy, automatically install collectors across host groups, validate installation through Falcon telemetry, and centrally manage third-party data ingestion from Fleet Management.

How AI Is Powering The Next Super Criminals

Shadow AI models with weaker guardrails increase the power of already talented attackers and help less skilled users assemble dangerous campaigns. Frontier systems write malware when prompted as penetration tests, scale up attack speed and make it easier than ever to launch offensive operations against defenders. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Best Software Composition Analysis Providers: Top 5 in 2026

Major software composition analysis (SCA) providers include Mend, Black Duck (Synopsys), and Veracode. They offer solutions to find, manage, and fix vulnerabilities and license issues in open-source components, with options ranging from developer-focused tools to enterprise-grade platforms with SBOM generation and deep compliance features.

Validate SOAR Workflows Instantly with Fusion SOAR Test Mode

See how CrowdStrike Falcon Fusion SOAR Test Mode lets security teams validate workflows instantly—without live alerts or production risk. You’ll learn how to run playbooks end-to-end using past events or mock data, safely test high-cost actions like LLM analysis, and debug logic with full visibility. With built-in transform testing and mock inputs, Test Mode speeds up automation and reduces errors for faster, safer deployment.

Tag Manager Security: How to Control GTM, Adobe Launch & Tealium for Privacy Compliance

Marketing needs to ship campaigns in hours. IT and engineering move in days. Tag managers live at the center of that conflict. They’re essential infrastructure, enabling marketing velocity by letting marketing teams deploy analytics, advertising pixels, and conversion tracking without IT or production bottlenecks. So campaigns launch faster, testing happens in real time, and teams optimize performance mid-campaign. But that same architecture can create compliance exposure.

Vulnerability Remediation: From Scan Results to Real Fixes

Vulnerability scanning is useless if you don’t fix what you find. This short breaks down a practical vulnerability remediation process to prioritize risk, patch faster, and reduce real-world exposure. Learn how security teams move from detection to closure, without months of backlog.

Protecting Azure DevOps with Rubrik

Your code is one of your organization’s most critical assets, and protecting it should be as resilient as the applications it builds. In this video, we walk through how Rubrik delivers enterprise-grade protection for enterprise-critical code by securing Azure DevOps repositories against accidental deletion, malicious activity, and ransomware threats.