Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon Data Security Secures Data Wherever It Lives and Moves

In modern organizations, sensitive data lives everywhere and is constantly moving. It is created, accessed, transformed, and shared across endpoints, browsers, SaaS applications, cloud services, GenAI tools, and agentic workflows. CrowdStrike is introducing CrowdStrike Falcon Data Security to protect data across constantly evolving business environments.

CrowdStrike Advances CNAPP with Industry-First Adversary-Informed Risk Prioritization

Interest in cloud-native application protection platforms (CNAPPs) has exploded over the recent years, partly due to their ability to reduce alert noise by translating siloed misconfigurations into correlated, theoretical attack paths and exposures. While many organizations have adopted these solutions in pursuit of outcomes like zero critical issues, cloud breaches continue to rise.

Why EDR and XDR are becoming essential for MSP security

Antivirus just isn’t enough anymore — not even close. Ransomware attacks constantly grow more sophisticated, zero-day vulnerabilities appear frequently and attackers increasingly rely on legitimate tools already inside a network rather than just on traditional malware. Antivirus alone just can’t protect organizations from all of those threats.

The 6 Best AI Insider Threat Monitoring Tools in 2026

Organizations have spent years hardening their perimeters against external attackers. Yet some of the most damaging breaches today originate from within. Insider threats—whether from disgruntled employees, compromised accounts, or AI agents—are responsible for a growing share of data loss and costly security incidents. Traditional security tools weren’t built for this reality.

News: AI-native Security Assurance leads the GRC Transformation

Enterprise CISOs are being asked to do more than ever. Their role is now two-fold: protector of the business and enabler of its growth. They need to reduce risk across a vast and changing digital environment, protect the business, satisfy customers, and meet compliance requirements. What’s more, they want to showcase the positive impacts of their security program to executive leadership and the board and support the growth of their organization.

The Library That Holds All Your AI Keys Was Just Backdoored: The LiteLLM Supply Chain Compromise

We just published a deep breakdown of the Trivy supply chain attacks yesterday. Twenty-four hours later, we’re writing about the next one. Same threat actor. Different target. Worse implications. This time it’s LiteLLM, the Python library that acts as a universal API gateway for over 100 LLM providers. If you’re building anything with AI agents, MCP servers, or LLM orchestration, there’s a good chance LiteLLM is somewhere in your dependency tree.

Gary Hibberd on InfoSec, GDPR and Owning Your Space

This episode explores why information security needs more wisdom, less noise and fewer empty promises about being “GDPR compliant.” It covers slowing down, valuing data properly, cutting through bad advice and why InfoSec professionals need to own their place as integral voices in modern organisations.  ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Why fraud prevention must evolve in milliseconds, not hours or days

When it comes to fraud prevention, most of us know that small steps can make a big difference: use strong passwords and a password manager, turn on multifactor authentication, and so on. But for banks, fintechs and payment processors, those small steps are just the beginning.

Nonprofit KYB: How to verify 501(c)(3) status and stay compliant

If you operate a fundraising platform, process donations, or work with nonprofit organizations, you’re expected to verify that those organizations are legitimate before doing business with them. This process is known as nonprofit Know Your Business (KYB) or non-profit verification, which requires confirming 501(c)(3) status and ensuring the nonprofit is in good standing. But the verification process for nonprofit KYB isn’t as straightforward as it sounds.