Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

EP25 - Identity is the attack vector w/ Udi Mokady

CyberArk founder and executive chairman Udi Mokady returns to Security Matters at a transformational moment—now as part of Palo Alto Networks, following the acquisition’s close on February 11. In this far‑reaching conversation, Udi and host David Puner explore why identity has become the attack vector for modern enterprises, driven by an unprecedented surge in human, machine and AI‑powered identities that attackers increasingly exploit.

What 'Hacker' REALLY Means

The episode breaks down what hacking means in security, from finding flaws and bypassing controls to the point where it turns into crime. The word hacker is often treated as a label for villains, yet many security researchers still use it with pride, so intent and context decide when it becomes malicious. ⸻ For more information about us or if you have any questions you would like us to discuss email podcast@razorthorn.com. We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion..

How to Set up the OTP Verification Plugin with WooCommerce Checkout Form?

The miniOrange OTP Verification Plugin validates customers' email addresses or mobile numbers by sending a One-Time Password (OTP) during the checkout process. By confirming the authenticity of the provided contact details, this plugin helps prevent fake orders, reduces fraud, and ensures secure transactions. In this video, we walk you through the complete step-by-step setup of the miniOrange OTP Verification plugin with the WooCommerce Checkout form. Follow along to enable OTP verification and enhance your store’s security.

Who Controls LLMs? Digital Sovereignty, Policy, and AI Security Risks | India AI Impact Summit 2026

AI agents are quickly becoming first-class actors in the digital ecosystem—logging into systems, invoking multiple APIs, collaborating, and even interacting socially with other agents. In a panel discussion on “Enhancing Cyber Resilience Across the Digital Ecosystem”, the miniOrange Founder & CEO Mr. Anirban Mukherji highlighted why digital identity is now the foundation for securing agent-driven environments, especially as authentication and authorization protocols expand globally across platforms and enterprises.

Intelligence Agencies: Proxy Action & 'Plozny Jurak'

In today’s cyber landscape, intelligence services often rely on proxy networks to expand their reach. Through ransomware affiliates, access brokers, and loosely connected cybercriminal ecosystems — sometimes referred to conceptually as “Plozny Jurak” — states can benefit from disruptive or espionage activity without direct attribution. To dive deeper, watch the full podcast, Blueprint Thieves: Inside Iran’s Industrial Espionage Machine, at the links below.

Why AI Agents are Next! The Death of APIs? #AI #Shorts

Why AI Agents are next is the biggest question in tech right now! In this breakdown, we look at how we're moving from static APIs to Agentic Interaction. While frameworks like MCP (Model Context Protocol) are gaining ground, the real challenge is creating a "Passport" system for AI agents from different companies to communicate securely. Key Insights: –Why AI Agents will replace traditional SaaS workflows.–The shift from deterministic APIs to dynamic agentic behavior.–The "AI Passport" – the missing piece for cross-company AI security.

Keeper 101 - How to Create Your Keeper Account on iOS

Learn how to create your Keeper Account on iOS in less than 2 minutes with our step-by-step guide. Signing up for Keeper's iOS mobile app is easy. Simply visit the App Store on your device, search for Keeper, and install “Keeper Password Manager”. Once the download is complete, tap Open to launch Keeper.