Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

Beyond PCI! Decoding the Essentials of Compliance Standards | ISO 27k and More | Razorthorn Security

Dive deep into the intricate world of compliance standards with our latest video, where we dissect the common misconception that a single standard, such as ISO 27k, is the be-all and end-all. In this eye-opening exploration, we debunk the myth that meeting PCI compliance requirements is the finish line. Discover why these standards are merely the foundation, not the complete story. Many find themselves entangled, thinking, "If I'm PCI Compliant, I'm done." Hold on – that's just the beginning!

Revolutionizing Work: The Evolution of Technology and its Impact on Jobs and Opportunities #podcast

In this insightful video, we delve into the fascinating journey of technological evolution and its profound impact on the way we work. From the days of pools of typists diligently typing away to the transformative era of computing, witness the incredible shift that has shaped our work landscape.

Mastering Security: Navigating Protective Detective, and Corrective Controls with Compliance Harmony

Dive deep into the world of cybersecurity with our latest video, "Mastering Security: Navigating Protective, Detective, and Corrective Controls with Compliance Harmony." In this insightful exploration, we demystify the roles of protective, detective, and corrective controls, highlighting their crucial functions in maintaining a robust control environment.

SEO Challenges: Tool Thefts, Short Lifespan, and Implementation Struggles || Razorthorn Security

Description: In the ever-evolving landscape of SEO, the operation is no longer as simple as it once was. It goes beyond just worrying about your own digital "house"; now, you must also consider the connected houses in the vast online neighborhood. Tool thefts add another layer of complexity to the SEO game, requiring constant vigilance to safeguard your digital toolkit.

Driving Change: Updating Defence in Depth for 2023 and Beyond

Here we are, at the end of 2023. It’s high time for updating defence in depth strategies across all organisations, and let me tell you why. We’re all aware of the uptick in high profile cyber attacks and compromises, across all sectors. Ransomware specifically has caused more economic loss and pain for the business world than any other information security event previously, and attacks are speeding up at a steady rate with larger and larger targets and ransoms being asked.

CISOs in the Spotlight: Lessons from the SolarWinds SEC Action

Unless you have been hiding under a rock the last few weeks, you will know about the SEC taking action against the SolarWinds CISO in a landmark case that is going to change the way CISOs undertake their jobs in the future. The SEC’s action against the SolarWinds CISO is a wakeup call for all CISOs.

Unleashing the Power of Technology: How AI is the Next Big Leap! || Razorthorn Security

In an ever-evolving world of technology, we often witness the remarkable phenomenon of exponential growth in power and capability. Join us as we explore this fascinating journey of technological advancement, from the skeptics who doubted the significance of email to the In an ever-evolving world of technology, we often witness the remarkable phenomenon of exponential growth in power and capability. Join us as we explore this fascinating journey of technological advancement, from the skeptics who doubted the significance of email to the unstoppable rise of AI.

Tech Evolution: From Typists to Email - A Transformative Journey || Razorthorn Security

Explore the captivating journey of technological evolution in our latest video, where we draw intriguing parallels between the past and present. Our technological progress is often a reflection of the enduring patterns of innovation in history. Once upon a time, office spaces were abuzz with typists meticulously transcribing letters and documents onto paper, catering to the needs of companies and their customers.

Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall || Razorthorn Security

Hello and welcome to Razorwire, the podcast where we delve into the world of cybersecurity with top experts and industry leaders. I'm your host, James Rees, and I can't wait to share this episode with you. As a PCI DSS QSA, I’m delighted to have PCI expert Jeff Hall as my guest today. This episode will give you a unique perspective on how security has evolved from early mainframe days to today's interconnected, risk-focused practices. Jeff tells us about his hard-won lessons and wisdom gathered over decades steering information security programmes including the need for compliance to work alongside overall security and not hinder it, and why auditors should be viewed as allies, not adversaries.

Balancing Ethics and Freedom: The Challenge of Regulating Public Access to Advanced AI like Chat GPT

In an era of rapid technological advancement, the availability of AI systems like Chat GPT to the public raises complex questions about ethics and limitations. Join us as we dive into the challenging debate surrounding the responsible use of this cutting-edge technology. 🤖⚖️ In this thought-provoking video, we explore the need for some rules to prevent the harmful use of AI while respecting the values of free expression. We will examine the difficult task of defining the ethical boundaries of AI systems and the impact of these decisions on our online conversations.