Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

Beyond Tech: Shaping Cybersecurity Through Strategic Influence

Robert Black discusses the misconception of cybersecurity as purely a technical issue. He highlights the importance of shaping opinions and strategies, reflecting on the National Cyber Force's cognitive effect strategy. Discover why cybersecurity requires more than just technical expertise.

The Art of Cyber Deception: How To Get Inside The Mind of A Hacker with Rob Black

**Explore Revolutionary Cybersecurity Tactics on Razorwire with Rob Black** Tune in to this week’s episode of Razorwire where host Jim engages with Rob Black, a former military strategist turned cybersecurity innovator. Rob’s extensive experience, from computer game design to defusing IEDs, provides a unique perspective through which we can understand adversary psychology in cybersecurity. For more information or to ask questions, email podcast@razorthorn.com. Visit for personalised cybersecurity consultation.

Understanding Risk in Cybersecurity: Balancing Cost and Protection

Cybersecurity is a game of risk management, balancing the costs of protection against potential losses. This clip emphasises the importance of quantitative risk assessment to set appropriate budgets and limits. Learn why it's crucial to align security spending with the value of assets being protected, and how to avoid overextending resources.

The Rising Costs of Cybersecurity: Budgets and Priorities

In this clip, the discussion focuses on the increasing costs of cybersecurity and the need for dedicated security budgets separate from IT. With certifications becoming more expensive and vendors raising prices, organisations must navigate tight budgets while ensuring robust security measures. Understand the economic pressures and strategies for maintaining effective security.

From Office to Remote: Adapting Endpoint Security Strategies

As remote work becomes the norm, organisations face new challenges in securing devices outside the office. This clip discusses the return to host-based security and the importance of robust endpoint security measures backed by logs and alerts. Learn how to adapt your security strategies for remote environments where device locations are unknown.

Remote Work Security: Trusting Employees and Protecting Data

With the rise of remote work, ensuring that employees are actually working from secure locations is more crucial than ever. This clip discusses the trust issues and risks associated with employees working from unapproved locations, highlighting the need for robust IT asset management and security protocols to protect sensitive data.

Trust and Control in Third-Party Audits: Navigating the Challenges

This clip explores the delicate balance between trust and control in managing third-party vendors. With only large corporations often able to conduct thorough audits, many organisations must rely on paper audits and trust the provided responses. Understand the limitations and strategies for ensuring security when physical audits aren't feasible.

Balancing Trust and Control: Effective Phishing Protection Strategies

Discover why balancing trust and control is essential in cybersecurity. Our hosts discuss the complexities of protecting against phishing attacks, especially with advanced tools like ChatGPT that make scams harder to detect. Learn how combining trust with effective controls can help detect anomalies and safeguard your organisation against targeted attacks.

User Training vs. Security Controls: Who's to Blame for Phishing Attacks?

In this thought-provoking clip, the hosts debate whether security awareness training is enough to prevent users from falling for phishing scams or if stronger controls are necessary. Drawing on insights from a recent NCSC blog, they explore the ethical dilemma of assigning blame when users, despite training, click on malicious email attachments. Should the onus be on the end user, or is it a failure of security controls? Tune in to understand the complexities of balancing trust and control in cybersecurity.

Trust vs Control - Is Zero Trust Inevitable?

Welcome back to Razorwire, the podcast slicing through the tangled world of cybersecurity! I'm your host, Jim and in this episode we’re talking about the crucial balance between trusting your workforce and exerting control over your security ecosystem. Joining me are Iain Pye, sharing his insights into privacy roles, and David Higgins from CyberArk, who will discuss the challenges and strategies of effective cybersecurity. Whether you're managing remote teams or integrating third party services, this episode is packed with expert analysis and actionable advice.