Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Why Every Website Needs a Reliable URL Checker

Links are the connective tissue of the web. They guide users to content, help search engines understand structure and distribute authority across pages. When links fail, everything from user trust to search visibility can suffer. This is where a URL checker becomes essential. A URL checker is more than a quick "does this page load?" tool. At its most basic level, it confirms whether a URL resolves successfully. At a deeper level, it reveals status codes, redirect chains, DNS issues and server errors that aren't obvious from simply clicking a link.

The 3 Types of Criminal Hackers

Criminal hacker groups fall into three broad camps, from ideologically driven actors attacking targets they dislike, to profit focused crews and state backed operators hiding behind deniability. Money driven groups dominate the landscape, yet all three types break systems, disrupt services and shape the threat model security teams face. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

The AI SOC Org Chart for 2026 and Beyond

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo John White is the Field CISO for EMEA at Torq. A respected security executive with more than 20 years of leadership experience, John previously served as CISO at Virgin Atlantic, where he led a multi-year transformation deploying the Torq AI SOC Platform to modernize cyber operations.

The ultimate match: Why integrated services make protection stronger for MSPs

Valentine’s Day is all about perfect pairs, and in cybersecurity, nothing creates more operational harmony than natively integrated services working together. That’s where unified cyber protection shines. Whether it’s the synergy of RMM and EDR, RMM and backup or email security and security awareness training, natively integrated cyber protection delivers efficiency and resilience that standalone tools can’t match.

1Password's new benchmark teaches AI agents how not to get scammed

As we embed AI agents into our lives and workflows, we’re learning the (sometimes surprising) ways in which they outperform human beings, and other ways in which they fall short. And occasionally, we find an example where agents, paradoxically, are both better and worse than their human users.

How miniOrange's GPT App Connects LLMs to Your WordPress Site

WordPress is entering a new phase in how websites are managed with the introduction of API Abilities and support for the Model Context Protocol (MCP). These updates allow WordPress core, plugins, and themes to clearly define the actions they support and how those actions should be executed. For the first time, WordPress can communicate its capabilities in a structured way that large language models can reliably understand.

Interview with a Threat Hunter: Brody Nisbet, Sr. Director of CrowdStrike OverWatch

Threat hunting is hard to define, but Brody Nisbet, Sr. Director of CrowdStrike OverWatch, breaks down the basics in an episode that starts with the CrowdStrike OverWatch mission and dives into his stories from the front lines of threat hunting.

From Operations to Policy: Contributing to the Global Fight Against Ransomware

Today, the government of Canada issued a statement announcing that Arctic Wolf will continue to co-chair the Counter Ransomware Initiative Public-Private Sector Advisory Panel in 2026, alongside Public Safety Canada and BlackBerry. The panel will also include member organizations such as Ensign InfoSecurity, the Institute for Security and Technology, Microsoft, Palo Alto Networks, and the Royal United Service Institute.

How Hospitals Sustain Patient Care When Systems Go Dark

In this episode of Building Cyber Resilience: A Healthcare Leader’s Guide, host Josh Howell speaks with Drex DeFord, veteran healthcare CIO, strategist, and President of 229 Cyber & Risk at This Week Health. Drawing on decades of experience leading technology and transformation across organizations like the U.S. Air Force, Seattle Children’s, Scripps Health, and Steward Healthcare, Drex explores what it really takes to sustain patient care when cyberattacks force systems offline.

Security Comprehension and Awareness Measure (SCAM) Demo

What happens when a state-of-the-art AI assistant can read your email, browse the web, and fill in your passwords — but can’t reliably tell a scam from the real thing? In this video, you’ll see real examples of frontier AI agents: These aren’t edge cases. This is the result of 1Password’s new benchmark: SCAM — Security Comprehension & Awareness Measure.