Project Glasswing. What Anthropic's Mythos Means for Cybersecurity

What happens when an AI model can find more vulnerabilities in a day than a red team could find in a year? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, I’m joined by Martin Voelk, penetration tester and AI red teamer, and Jonathan Care, lead analyst at KuppingerCole covering AI and cybersecurity.

AI Workload Security for Healthcare: What CISOs Need to Prove Under HIPAA

A patient calls your privacy office and requests an accounting of every disclosure of her PHI made outside treatment, payment, and healthcare operations over the past six years. This is her right under HIPAA. Your privacy officer pulls the EHR disclosure log. It is complete through the day your organization deployed its first production AI agent.

Built for MSPs: Is Your Security Ready for Today's Threats?

Managed service providers are under more pressure than ever—protecting multiple clients, managing growing toolsets, and responding to increasingly sophisticated cyber threats. But fragmented solutions, alert fatigue, and limited visibility can slow you down and impact the service your clients rely on. Today’s MSPs need more than just more tools.

CrowdStrike Falcon Cloud Security Delivered 264% ROI Through Unified Cloud Protection

Many modern cloud security challenges come down to visibility. The complexity of modern environments, the deluge of alerts, and the lack of relevant context make it difficult for security teams to identify and prioritize threats — and easy for adversaries to slip through undetected.

Cyberhaven Now Transacts on All Three Major Cloud Marketplaces

In enterprise software, winning a deal is not just about product fit. The buying process matters just as much. Even when a customer is committed to moving forward, procurement friction can slow or stall a deal. New vendor setup, contract reviews, billing workflows, approval chains, and budget constraints all add complexity that extends timelines and increases the risk of deals falling apart. That is why procurement flexibility is not a back-end operational concern. It is a customer experience issue.

How to investigate cloud credential compromise with Bits AI Security Analyst

Cloud environments create a flood of security signals, often reaching tens of thousands per day depending on the organization’s size. Security engineers and analysts spend a disproportionate share of their time triaging these signals instead of acting on legitimate threats. But the time-intensive parts of that work, such as identifying related signals and building a timeline, can be handled systematically, leaving teams free to focus on what actually requires human judgment.

Anthropic's Mythos and the New Reality of AI Cybersecurity Risk

I was on ABC News recently discussing why banks are on alert as new AI systems like Anthropic’s Claude Mythos raise cybersecurity concerns. What struck me most is how quickly the conversation has shifted. This is no longer a hypothetical risk or something we are planning for in the future. Financial institutions and regulators are reacting in real time to what AI is already capable of doing. From my perspective, we are still underestimating how fast this is moving.