Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Cybercriminals are using AI - and How to Defend Against It

What happens when the dark side gets its hands on cutting-edge AI — and why might even seasoned defenders find themselves playing catch-up? Welcome back to Razorwire, where I’m joined by Oliver Rochford and Richard Cassidy to discuss how criminals are using AI, what’s actually working and how the threat landscape is changing. We explore how adversaries are using AI, what’s actually working in the wild and how professionals can prepare for the unsettling pace of change.

RBI Compliance Made Simple with AppTrana | Secure Your Banking and Payment Apps

In H1 2025, Indusface AppSec data recorded over 742 million attacks on banking and financial websites, a 51% surge from last year. 77% exploited known vulnerabilities, bots hit 95% of sites, and DDoS attacks spiked by over 500% on APIs. To counter these threats, the RBI’s Digital Payment Security Guidelines mandate stronger defenses across web apps, APIs, and data systems.

Online Games and Internet Speed: How to Match Your Connection to Your Playstyle

When it comes to online gaming, your internet speed is only part of the story. Many players obsess over their download rate, but for most games, low ping and a stable internet connection matter even more. Whether you're snipping opponents in a competitive shooter, exploring open-world RPGs with friends, or teaming up in a massive MMO, your network's performance can mean the difference between your victory and your defeat.

Step-by-Step: Producing a Staff Training Book for Phishing Awareness Workshops

Nowadays, with the development of technology, more teams are operating remotely. Companies have realized that it's important that these teams also get some kind of cybersecurity training. Data breaches happen often and no company wants its private data leaking and being out in the world. Seeing your team recognize and report a phishing email with confidence is what every IT security department aims for. When your training materials are finally ready and employees are actively using them, you realize that you've created something that strengthens your organization's awareness and preparedness.

The Evolving Landscape of Cybersecurity: Why Risk Management Is More Important Than Ever

In today's interconnected business world, every organization relies on a network of partners - from software providers and payment processors to data storage and cloud services. While this interconnectedness drives innovation and efficiency, it also introduces serious cybersecurity risks. A single vulnerability in your vendor ecosystem can open the door to data breaches, ransomware attacks, and compliance failures.

How to Detect and Mitigate Common Active Directory Attacks

Active Directory is the heart of enterprise identity and access management, and its crucial role makes it a target for hackers looking for control, persistence, and privileged access. The fact that AD is central to organizational functions makes proactive, multi-layered, and intelligence-driven security strategies a must in order to ensure it is always able to withstand even the most sophisticated, continuously evolving threat actors.

Browser Agent Security Risk - ChatGPT Atlas Corporate Adoption Trends

Last Tuesday, October 21st, OpenAI released ChatGPT Atlas, an AI-powered browser that allows users to interact with ChatGPT directly from any browser tab. Throughout last week, the Cyberhaven Labs team tracked its adoption in corporate environments and actively investigated its security vulnerabilities.

The Howler Episode 23 - Matthew Trushinski, Vice President of Product Marketing

This month we sit down with Matthew Trushinski, Vice President of Product Marketing, as he shares how he cultivates creativity & innovation within himself and his team, skills he thinks all product marketers should have, and so much more! Matthew Trushinski has a diverse technology marketing background including carrier networks, IoT, smart cities, AI and security. As the Vice President of Product Marketing for Arctic Wolf, he works with customers and prospects to improve their security operations.

PCI DSS 4.0.1: A Field Guide to Requirements 6.4.3 & 11.6.1

By the time you reach PCI DSS 4.0.1 Requirements 6.4.3 and 11.6.1, the easy wins are behind you. This is the point where compliance turns into configuration. Tag managers, consent scripts, and payment flows all intersect here, and the guidance feels just vague enough to slow everything down. Which tag rules belong in scope? How do you prove a script was authorized? What’s the right way to detect a change without flooding alerts?

EP 18 - The humanity of AI agents: Managing trust in the age of agentic AI

In this episode of Security Matters, host David Puner sits down with Yuval Moss, CyberArk’s VP of Solutions for Global Strategic Partners, to explore the fast-evolving world of agentic AI and its impact on enterprise security. From rogue AI agents deleting production databases to the ethical blind spots of autonomous systems, the conversation dives deep into how identity and Zero Trust principles must evolve to keep pace. Yuval shares insights from his 25-year cybersecurity journey, including why AI agents behave more like humans than machines—and why that’s both exciting and dangerous.