Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

Unraveling Cyber Intrigue: Decoding the Complexities of State-Sponsored Hacking Groups

Join us as we uncover the intricate web of state-sponsored hacking groups and the hidden motivations driving their actions. Explore insights from recent revelations, including examples from China dating back to 2012-2013, where various government agencies sponsored competing hacking groups. In this eye-opening discussion, we delve into the financial motivations behind these operations and shed light on the key players pulling the strings. From government agencies vying for dominance to clandestine funding sources, the landscape of cyber intrigue is more complex than meets the eye.

Unveiling Blind Spots Navigating Threat Intelligence Alignment in Government Agencies

Join us as we delve into the critical importance of using the right threat intelligence tailored to the unique identity of your organization. Discover insights from a recent encounter with a major government agency responsible for key elements of the UK economy, where the lack of awareness about their own data protection and adversaries was startling.

The Latest Tech Won't Save You: Why Cybersecurity Needs More Than Tools

Recently, Computer Weekly released an article entitled “Budgets Rise As IT Decision Makers Ramp Up Cybersecurity Spending” on 18th March 2024. It was an interesting article as it cited a number of stats that showed that IT departments plan to increase their cybersecurity budget and that globally 65% of organisations were going to spend more on cybersecurity.

Unlocking the Divide: Navigating AI Poverty and Intelligence Disparity in Industry

Join us as we explore the concept of "AI poverty" and the intelligence disparity within our industry. Discover how well-funded, mature companies use advanced AI technologies to their advantage, while mid-sized businesses face a significant shortfall in accessing valuable intelligence. In this thought-provoking discussion, we delve into the challenges mid-sized businesses face in harnessing the full potential of threat intelligence. From overwhelming precautions to limited resources for automation, the struggle is real.

The Real Impact of the Lockbit Ransomware Takedown | Razorthorn Security

Welcome to Razorwire, the cutting-edge podcast for cybersecurity professionals, where we unravel the world of information security and peek into the future of technology. I'm your host, Jim, and in today's episode, we're joined by our esteemed guests, Richard Cassidy and Oliver Rochford. We’re taking a deep dive into the recent Lockbit takedown, dissecting the movements in the global cybercrime landscape, and analysing the ongoing conflicts within the commercial industry.

Crossing Lines: Exploring the Intersection of State-Sponsored Cyber Warfare and Corporate Espionage

Delve into the murky world where state-sponsored cyber warfare meets corporate espionage in our latest video. Join the discussion as we explore the possibility of the same groups engaging in both activities, leveraging their expertise across different clients and operations. Uncover the risks and motivations behind these clandestine maneuvers and their implications for global security. Other episodes you'll enjoy.

Strategic Skill Building: The Business Approach of Mercenary Groups in Modern Warfare

Explore the strategic approach of mercenary groups in modern warfare in our latest video. Discover how these organizations are investing in upskilling their personnel to ensure they have the expertise and tools necessary for successful operations. Join the conversation as we delve into the parallels between running a business and managing a mercenary group, and the importance of building trust with clients, even if they happen to be nation-states.

Digital Mercenaries: Unveiling the Cyber Side of Chaos || Razorthorn Security

Explore the complexities of using tenants in the digital world in our latest video Discover how their strategies mirror those used in physical activity, from detecting vulnerabilities to creating chaos. Learn how these digital mercenaries act as the first line of offense, uncovering vulnerabilities before handing them over to professionals for penetration. Join the discussion as we discuss the implications of their actions and the role they play in cybersecurity.

Mercenary Cyber Warfare: Expanding Tactics Beyond the Battlefield || Razorthorn Security

Dive into the realm of mercenary cyber warfare in our latest video. Explore the implications of mercenary groups branching into cyber operations, disrupting grids, and targeting crypto wallets. Join the conversation as we examine the potential havoc these tactics could wreak and the motivations behind such endeavors. #mercenary Other episodes you'll enjoy With new episodes every other Wednesday, Razorwire is a podcast for cybersecurity enthusiasts and professionals providing insights, news, and fresh ideas on protecting your organization from hackers.