Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Vendor Tiering Series: Why Tier Your Vendors

The thing about blanket approaches is that they rarely work or scale. The same holds true for third-party cyber risk management. Treating every provider, stakeholder, or partner with the same intensity is neither productive nor cost-effective. While defaulting to treating every vendor at the same risk level is common, it is not a resilient security strategy.

Autonomous Service Desk: Possible NOW - Tanium Tech Talks #155

Meet the autonomous service desk - powered by live endpoint intelligence. See how ServiceNow NowAssist + Tanium deliver agentic triage, real‑time diagnostics, and guided remediation the moment an incident hits. Agentic triage kicks off instantly when an incident is created Real-time endpoint intelligence beats assumptions every time Confidence‑scored root cause analysis reduces investigation from hours to minutes The power of bounded autonomy (strong guardrails + powerful automation)

When Security Fails, Incident Response Decides Everything

The episode explores what happens after security fails, from inevitable incidents and one big ransomware hit away from collapse to money, media noise and decision power at 1 a.m. Viewers hear how poor planning burns cash without progress, why authority and rehearsal matter, and how psychology, struggle and resilience shape every response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

Speed, Stealth, and AI: The CrowdStrike 2026 Global Threat Report

It’s that time of year: The CrowdStrike 2026 Global Threat Report is live, and Adam and Cristian are here to break down the key findings. This year’s report spotlights adversaries’ heightened speed, their evolving use of AI, an increase in activity from China and North Korea, and the growth of supply chain attacks, zero-day exploitation, and cloud targeting. For new listeners, the annual Global Threat Report delivers an analysis of the modern threat landscape based on CrowdStrike's frontline observations and real-world threat intelligence from the previous year.

The Rise of the AI Security Engineer: A New Discipline for an AI-Native World

We are witnessing the birth of a new profession in the blend of security engineering and security operations, a discipline that didn't exist five years ago because the systems it protects didn't exist five years ago. As artificial intelligence moves from experimental to essential and agentic systems begin to perceive, reason, act, and learn autonomously, we need defenders who can operate at the same velocity. I'm talking about the AI Security Engineer.

Cloud Security for Financial Services: Building a Compliant AWS Environment

Financial services organizations moving to AWS often discover that retrofitting security and compliance controls costs three to five times more than building them in from the start. Compliance gaps discovered during audits can delay critical initiatives, trigger regulatory scrutiny, and expose organizations to unnecessary risk.

Post-incident review: Source map exposure on non-production subdomain

Update (February 24, 2026): @vmfunc has published part two of their series about Persona. You can read it here. We will update this post with part three when it is released. On February 16, 2026, security researchers @vmfunc, @MDLcsgo, and @DziurwaF published a blog post identifying exposed frontend source maps on a non-production subdomain under withpersona-gov.com.