Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Missing one person could shut down everything #BusinessRisk #Vulnerable

One exercise killed off the leader on paper and left the management team to run the organisation without that decision maker or access to key mandates. The scenario exposed hidden dependencies, legal bottlenecks and fragile processes, and forced everyone to map where single points of failure threaten both business and incident response. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

APIs Are Critical Infrastructure. Why Aren't We Treating Them That Way?

‍In this session, we take an in-depth look at what it truly means to treat APIs as critical infrastructure. Using industry data and real-world examples, we explore the gap between how much businesses rely on APIs and how well they are actually protected. And we talk about why that gap introduces operational and regulatory risks.

Secure Enterprise AI Apps and Agents: Visibility, Governance, Runtime Protection

When you deploy an AI application, do you know what's being sent into it — or what's coming back out? Cato AI Security provides runtime protection for the AI applications your organization builds and deploys, with real-time enforcement, sensitive data anonymization, and a complete audit trail across every interaction. Learn more or request a demo at catonetworks.com.

Modern Application Delivery Requires Unified Management & Flexible Licensing

Modern Application Delivery Requires Unified Management & Flexible Licensing Jamison Utter and Priyanka Mullan, Senior Product Marketing Manager at A10 Networks, discuss the fundamental infrastructure that powers today's modern applications. While technologies like AI and APIs often steal the spotlight, the true backbone of high-performing digital services lies in robust Application Delivery Controllers (ADCs).

Rethinking Application Delivery for the AI Era

Rethinking Application Delivery for the AI Era Is your network strategy keeping up with the AI era? Jamison Utter, Field CISO at A10 Networks, challenges IT leaders to move beyond "piecemeal" infrastructure and rethink their approach to application delivery. As organizations face the dual pressure of integrating AI workloads and managing a vast "fleet" of hybrid devices, the old ways of operating are becoming a liability. Jamison discusses the true cost of administrative overhead and the urgent need for a more flexible, simple, and future-proof vendor strategy.

I Faked a Receipt with ChatGPT

Generative AI can produce realistic taxi receipts, complete with stains and wear, which blend into digital expense workflows that expect only a quick photo upload. As more organisations move to app based reimbursement, synthetic documents slip through unless controls, audits and behavioural checks keep pace with these tools. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

U.S. Cyber Strategy, data center targets, Camaro Dragon & Stryker attacked / Intel Chat [301]

In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community. Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.