Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sophos Firewall: Configuration Viewer

An overview of the new Sophos Firewall Configuration Viewer - a standalone, browser-based tool that converts firewall configurations into a clear, human-readable format, enhancing your viewing, auditing, documentation, and comparison capabilities. All data is processed locally, so your information remains 100% private. Ask questions and get expert answers in the Sophos Community.

Flipper Zero And Dual Use Security Tools

Multi purpose devices such as Flipper Zero support security audits through radio, infrared and bluetooth testing, while also enabling garage door opens and other abuse. Some countries ban these tools outright and treat them as malicious, yet the real issue sits with intent, in the same way a weapon in the wrong hands becomes a problem. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How to Respond After an Active Directory Compromise: Step-by-Step Active Directory Response and Recovery Playbook

Enterprise IT relies heavily on Active Directory (AD) for user, access, and authentication management. A compromise can harm systems, data, and accounts. Why Swift Response Matters A fast, effective response can contain an AD incident, while delays can turn it into a major organizational crisis, including: A clear AD response plan is essential to systematically: Long downtime, damage to organization’s reputation, and problems with compliance can result from neglecting proactive AD recovery.

Customer Insights with Clark Pichon, Security Operations Center Manager

In this video, Clark Pichon, Security Operations Center Manager, shares how they're leveling up security operations with the help of AI and automation. From building queries faster using Dojo AI to cutting down time-to-detection and closing alerts more efficiently with SIEM automation, see how these tools are helping the team work smarter and respond faster than ever before.

Why Your AI Agents Aren't Enterprise Ready #ai #shorts

Stop building AI agents that CISOs will never approve. If your agents are stuck in the POC (Proof of Concept) stage, it’s likely because they lack a "Passport" and a governance framework. In this clip, Arjun Subedi breaks down why "how well it works" isn't the biggest question in AI anymore—it's "how can I govern it?" Discover how mapping AGENTIC attacks to the MITRE ATT&CK framework through SafeMCP is the missing link to enterprise-level deployment.

Single Sign-On Architecture Deep Dive: Protocols, Tokens & Identity Flow

Given the mountain of applications that we use today, having them together and logging in to each of them can be a hassle. However, a well-designed SSO architecture comes to your rescue increasing productivity and simplifying your daily worklife. This blog aims to unfold the differences in SSO architecture, with a focus on SSO protocols like SAML, OAuth, as well as architecture diagrams, integrations, challenges, and best practices that expert teams are already using.

Acronis earns a place on CRN Security 100 list for the fifth consecutive year

Acronis has earned a spot on CRN’s 2026 Security 100 list in the Identity, Access And Data Security category, marking its fifth consecutive year on the annual ranking. The program highlights channel focused security vendors that help organizations address a rapidly evolving threat landscape across categories such as endpoint and managed security, identity and data security, network security, security operations, and web and application security.

Hybrid Cloud Defense Grid: Bridging Wiz and Runtime Telemetry

The modern cloud security landscape is often fighting a war on two disconnected fronts. On one side, we have Cloud Security Posture Management (CSPM) platforms like Wiz, which act as the cartographers of risk—mapping terrain with high fidelity to identify open ports, unpatched vulnerabilities, and toxic permission combinations. On the other hand, we have Runtime Defense tools (SIEM, EDR, NGFW) that generate massive streams of activity logs.

The Real Risks of Agentic AI in the Enterprise with Camille Stewart-Gloster

In this episode of Data Security Decoded, host Caleb Tolin is joined by Camille Stewart-Gloster, CEO of CAS Strategies and former Deputy National Cyber Director, to unpack how AI is redefining cyber risk at every layer of the organization. Camille explains why identity-based attacks are so effective and how non-human identities (from APIs to AI agents) are quietly expanding the attack surface. She emphasized how critical MFA is for organizations to enable as they scale up AI operations, and why conditional access and governance must be foundational, not optional.