Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Document fraud is getting worse. Here's what's changing.

Physical discs have given way to streaming. You can make a purchase with a tap of your phone. But relying on documents to verify business and individual identities isn't going anywhere. In fact, the opposite is true. Some regulations require document checks during identity verification. Even when that’s not the case, documents are becoming popular and valuable components of identity checks because they provide information that isn’t available elsewhere.

Common Facebook Scam Method

A friend posted this on Facebook and it came up on my feed. I know this person and I was so sorry to read. How horrific! I had no idea who was killed in the accident, so I clicked on the news story. It took me to a site that posted this: This is a real reCAPTCHA posted to filter out anti-malware and content filtering services. When I saw this I knew that this was a fake news story and that my friend’s Facebook account had been taken over by a scammer.

The Real ROI Problem: Intelligence That Isn't Enforced

Today, most security reporting is trapped in a defensive cycle: detect a threat, react to it, report how serious it was. Rinse and repeat. The problem? Executive fatigue. Boards and leadership teams are tired of hearing about noise. They don’t want another dashboard of inbound attacks. They want to understand how cybersecurity protects revenue, sustains operations, and strengthens governance. It’s time to stop reporting on threats—and start reporting on business continuity.

Claude Code Security: Why Cyber Investors are Panicking

Artificial intelligence, cybersecurity, Claude Code Security, AI security tools and cybersecurity stocks are dominating headlines, but is AI really replacing security professionals? In this Razorwire Raw episode, Jim breaks down the market panic following Anthropic’s Claude Code Security launch, why cybersecurity investors reacted so strongly and what AI can actually do today versus industry hype.

Detect OPERATOR PANDA at the Edge with Falcon Adversary Overwatch

CrowdStrike Falcon Adversary Overwatch: ► Detect adversaries hiding in your blind spots. Falcon Adversary Overwatch exposes threats targeting network edge devices—firewalls, routers, and infrastructure traditional security tools can’t see. Watch the demo to see how CrowdStrike detects OPERATOR PANDA in real time and stops edge-driven intrusions that quickly turn into credential theft and identity abuse before they escalate.

Maximizing Your Microsoft Security Stack with LevelBlue

Microsoft has made significant gains in the cybersecurity market, earning top rankings from leading analyst firms such as IDC and Forrester for its endpoint protection and threat detection and response capabilities. Solutions like Microsoft Defender XDR and Microsoft Sentinel provide powerful, integrated security across endpoints, identities, email, cloud workloads, and data. But technology alone does not deliver outcomes.

CVE-2026-20127: In-Depth Analysis of the Cisco Catalyst SD-WAN Authentication Bypass Vulnerability

Software-defined networking (SD-WAN) has transformed enterprise infrastructure, enabling dynamic connectivity between sites with centralized management and control. But when the control plane itself becomes vulnerable, network integrity is no longer a given.

Springing into a new round of YDWWT!

When we think of spring, we think of things in bloom; flowers, ideas, maybe even hope for the snow to melt here in our US headquarters Boston, MA. But regardless of the snow, we've chosen to embrace the idea of spring and letting your workflow creativity grow! What better way to let that creativity shine than with another round of You Did WHAT With Tines?! (YDWWT) For the Spring 2026 round of YDWWT, we want to know what your team can achieve with a Tines workflow.