Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Useful or Spam? A CISO's Guide to Vendor Outreach

Why do so many vendors still get it wrong when selling to security leaders? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, I’m joined by Marius Poskus, CISO at a fintech organisation and host of the Cyber Diaries podcast, and Simon Woods, co-founder of One Compliance and a salesperson who’s been working in cybersecurity sales for over 15 years.

How Banks Are Using Stablecoins, Custody & Tokenization in 2026

The 4 digital asset use cases banks are monetizing in 2026: custody, stablecoin transaction banking, trading and brokerage, and tokenization. John Hallahan, Director of Business Solutions and Advisory for EMEA at Fireblocks, walks through how leading banks are building a single horizontal infrastructure stack to deliver across all four use cases, with real customer examples from BNY, ABN AMRO, Revolut, Banking Circle, JPMorgan, Citi, and DBS.

What Your Data Loss Prevention Tool Misses Every Single Day

In this video, you will learn why legacy DLP tools go blind when sensitive data is copy-pasted into generative AI tools, how Data Lineage fingerprints information at its origin to track it across transformation within an environment, and how operating system-level monitoring eliminates the encryption blindness that limits browsers and firewalls. You will also see how to build context-aware paste policies that allow productive AI use while blocking high-risk data flows from sources like source code repositories, Salesforce, and internal wikis.

The Exploitability Intelligence Gap: What Security Teams Can Know Before CISA KEV

In this webinar, Nucleus Security CEO Steve Carter and Product Marketing Lead Tally Netzer break down the growing “exploitability intelligence gap” and what it means for modern vulnerability and exposure management programs. Drawing from six months of research and real-world vulnerability data, they explore how attacker timelines have compressed, why traditional reactive workflows are struggling to keep pace, and where organizations are missing critical signals before exploitation begins.

Ep. 57 - Russia's Proxy Bridge: BlackCat, Scattered Spider, and the Kremlin

In Part 4 of our Russian intelligence series, host Tova Dvorin and Adrian Culley map the proxy bridge between Western teenage hackers and Moscow. BlackCat (ALPHV) ransomware-as-a-service is the operational hinge: Scattered Spider breaks in, BlackCat encrypts, and the FSB watches the dashboard. Hear how the Kremlin earns plausible deniability, why a $115M extortion stream self-funds Russian intelligence, and what MI6's new "hybrid shadow war" warning means for defenders simulating Rust-based ransomware in their own networks.

AI Is Replacing Security Dashboards (Headless Cloud Security Explained)

AI is changing cloud security—and dashboards might be next to go. In this video, we introduce headless cloud security: a new model where AI agents, not humans, operate security systems. Instead of dashboards and manual triage, security becomes API-driven, automated, and built for autonomous execution. This shift redefines DevSecOps, cloud security, and AI security workflows—moving humans from operators to orchestrators.

Incident Response: Keeping Cool When Everything's on Fire

The DevOps revolution broke down the traditional silos between development and operations, fundamentally reshaping how we build and maintain software. But with this evolution came an inevitable, and often stressful, reality for many engineers: being on-call and responding to incidents. In this session, Daljeet Sandu will explore how on-call has evolved in recent years, highlight proven best practices, and share insights into the future of incident response in DevOps.