Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Top 10 Identity Governance and Administration Solutions

In most organizations, identity governance and administration (IGA) solutions are supposed to answer one simple question: who has access to what, when, and why? But in cloud-native teams shipping daily, that question gets messy fast. Permissions sprawl and temporary access quietly become permanent. The blast radius is colossal. Third-party involvement in breaches doubled to 30% over the last year, which is exactly what happens when access decisions are scattered across vendors, apps, and infrastructure.

Apono Launches Agent Privilege Guard, Bringing Runtime Privilege Guardrails to Enterprise AI Agents

NEW YORK – March 18, 2026 – Apono, the agentic-forward cloud-native Privileged Access Management platform, today announced the launch of Agent Privilege Guard, a new product that gives enterprises the ability to deploy AI agents at full velocity without creating security risks they cannot control.

Why the US Military Has a Zombie Apocalypse Plan

Military war games use zombie apocalypse scenarios not for fantasy, but to push teams beyond routine thinking and train fast decisions under absurd pressure. The aim is to build habits for complex crises, so when a real incident arrives, people respond with practised judgement instead of paralysis and argument. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Executive Tabletop Exercises: From Compliance Exercise to Revenue Protection Strategy

Executive tabletop exercises are commonly positioned as cyber incident rehearsals. They tend to focus on breach containment decisions, regulatory notification timelines, and communications planning. Those elements are necessary; however, they are not what ultimately defines the true risk to the enterprise and what keeps the C-suite up at night. For senior leadership and board members, a cyber event is first and foremost a business disruption.

What You Need to Know about the Healthcare Interactive Data Breach

Healthcare Interactive, Inc., also known as HCIactive, is an Ellicott City, Maryland-based provider of AI-powered software solutions for insurance enrollment and benefits administration. Founded in 2006, the privately held company has fewer than 100 employees but serves healthcare organizations and insurers nationwide. As a HIPAA business associate, HCIactive processes and stores protected health information for multiple covered entities, giving it access to large volumes of sensitive patient data.

AI Is Building Your Attack Surface. Are You Testing It?

The market is flooded with claims. One vendor tops a leaderboard. Another raises nine figures on a pitch deck. Meanwhile, your developers shipped three AI-generated services before lunch. Here's the conversation the industry isn't having, and the one we've been building toward for years. There's a version of this conversation happening inside every Security team right now. Someone demos an AI coding assistant. The speed is undeniable and the team is in awe. Still cautious, sometimes skeptical.

CVE-2025-32975: Arctic Wolf Observes Exploitation of Quest KACE Systems Management Appliance

Starting the week of March 9, 2026, Arctic Wolf observed malicious activity in customer environments potentially linked to the exploitation of CVE-2025-32975 on unpatched Quest KACE Systems Management Appliance (SMA) instances that were publicly exposed to the internet. This vulnerability was patched in May 2025. Quest KACE SMA is an on-premises appliance for centralized endpoint management, providing inventory, software deployment, patching, and endpoint monitoring capabilities.