|  By Razorthorn
Razorthorn has worked with wide range of technically savvy clients who are confident they would spot a fake, but confidence is exactly what makes deepfake fraud so effective. In 2024, a finance manager at engineering firm Arup transferred $25 million to fraudsters after taking part in a video call with what appeared to be his CFO and several colleagues. Every person on that call was fabricated. None of it was real.
  |  By Razorthorn
Your third party suppliers probably aren’t as secure as you think they are. SecurityScorecard’s 2025 Global Third Party Breach Report found that at least 35.5% of all data breaches in 2024 originated from third party compromises. That’s not a minor risk you can ignore. The numbers tell a stark story. But here’s what most organisations miss: the real figure is likely higher since many breaches aren’t disclosed or are mistakenly reported as internal incidents.
  |  By Razorthorn
Let’s get right to it: Razorthorn Security helps organisations achieve and maintain PCI DSS compliance through expert consultancy, gap analysis and preparation for formal assessment and has been recognised by Gartner as a market leader in PCI DSS QSA services. If you’re handling payment card data, you’ll need qualified support to navigate the 500+ controls that PCI DSS demands.
  |  By Razorthorn
Passwords were invented in the 1960s. Six decades later, we’re still using them to protect everything from email accounts to bank transfers to corporate networks. The problem isn’t just that they’re old technology, it’s that they were never designed for the world we live in now.
  |  By Razorthorn
Guest post by Capsule Cyber insurance has rapidly evolved from being considered a specialist offering to a critical pillar of modern risk management. Yet many businesses still misunderstand what it covers and just as importantly, what it doesn’t do.
  |  By Razorthorn
When it comes to cyber insurance for SMEs, many small and medium-sized enterprises believe that cyber insurance feels like an optional extra, not a necessity, something to worry about later. This risk-taking attitude is often driven by various common misconceptions: The opposite is often true. Smaller businesses are frequently seen as easier targets due to limited budgets, lean security teams, and less mature cyber defences.
  |  By Razorthorn
By James Rees, MD, Razorthorn Security The Digital Operational Resilience Act (DORA) isn’t just another regulatory hurdle to clear. It’s fundamentally changing how financial institutions think about operational risk, particularly when it comes to the third party providers that now handle much of their critical technology infrastructure. DORA third party compliance has become a critical priority for EU financial institutions since the regulation came into force in January 2025.
  |  By Razorthorn
By James Rees, MD, Razorthorn Security The artificial intelligence revolution isn’t coming. It’s here and it’s moving faster than anyone predicted. Children now trust ChatGPT more than their parents for information. AI-generated content is becoming indistinguishable from human work. Entire industries are being reshaped by technology that seemed like science fiction just a few years ago.
  |  By James Rees
The artificial intelligence revolution isn’t coming. It’s here and it’s moving faster than anyone predicted. Children now trust ChatGPT more than their parents for information. AI-generated content is becoming indistinguishable from human work. Entire industries are being reshaped by technology that seemed like science fiction just a few years ago.
  |  By James Rees
Continuous Threat Exposure Management (CTEM) is gaining increasing recognition as a crucial component for mature cybersecurity programmes. Both Gartner and Forrester have highlighted CTEM as “a strategic imperative,” underscoring its importance in addressing modern cyber risks. This recognition is well founded, as demonstrated by recent cyberattacks on major organisations including Marks & Spencer, Co-op, Harrods, the NHS and American healthcare institutions.
  |  By Razorthorn Security
Technical skill opens doors, but communication is what gets ideas accepted by leadership. In cybersecurity, the real challenge is often turning complex risk into clear business language that a CEO, CTO or CFO understands straight away.
  |  By Razorthorn Security
Bad sales habits often come from low effort, low curiosity and people who stop learning once they land the role. When sales becomes lazy, every decent salesperson has to fight twice as hard to rebuild trust with buyers who are already tired of being spammed.
  |  By Razorthorn Security
The biggest mistake is assuming persistence alone will win the deal. Repeating the same message and listing product features without understanding the real pain points makes the whole approach feel tone deaf from the start.
  |  By Razorthorn Security
Nothing kills trust faster than pitching services to someone who already does that work for a living. If your outreach is auto generated, poorly targeted and built on zero research, most CISOs will write you off before you ever get a second chance.
  |  By Razorthorn Security
Desperate sales outreach rarely works because it feels generic and self serving from the first line. A better approach starts with real research, a relevant human detail and a message that proves you paid attention before trying to earn the conversation.
  |  By Razorthorn Security
Why do so many vendors still get it wrong when selling to security leaders? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, I’m joined by Marius Poskus, CISO at a fintech organisation and host of the Cyber Diaries podcast, and Simon Woods, co-founder of One Compliance and a salesperson who’s been working in cybersecurity sales for over 15 years.
  |  By Razorthorn Security
This episode breaks down why so many sales approaches fail with CISOs, from lazy research and scripted persistence to tone deaf messaging and zero trust building. It also shows what works better, active listening, free value, real relationships and outreach that respects how security leaders think and buy.
  |  By Razorthorn Security
Not every undisclosed bug is undiscovered; some are quietly sold through brokers to whoever pays the most. Governments, criminal groups and private buyers all compete in a shadow market where valuable software flaws become products long before the public ever hears about them.
  |  By Razorthorn Security
The deepest threat is not that AI finds one clever bug, it is that it can do offensive work at a scale humans never could. Tasks that once demanded time, money and elite skill can now be accelerated, repeated and widened far beyond the limits of a traditional red team.
  |  By Razorthorn Security
The next phase of cyber conflict may not be human against human, but attacking agents against defending agents at machine speed. Offensive models will probe, adapt and retry, while defensive models learn to counter them, leaving humans to supervise a battle fought mostly by software.

Razorthorn has a single purpose: to defend business-critical data and applications from cyber attacks and internal threats. Founded in 2007, Razorthorn has been delivering expert security consulting and testing services to some of the largest and most influential organisations in the world, including many in the Fortune 500.

Leaders in Cyber Intelligence:

  • Cyber Security Consultancy: Delivering professional and dedicated consultants to our clients, we are specialists in all areas of cyber security consulting. Whether you need help with cyber security compliance or require CISO services, we work closely with our clients to provide short term or ongoing support, in line with your requirements and budget.
  • Cyber Security Testing: It is essential to test your cyber security posture regularly, whether it’s a requirement for compliance or to ensure you are getting value for money from your cyber security solutions. In addition to pen testing, Razorthorn offer a comprehensive suite of cyber security testing services to ensure your data and business reputation is as secure as possible.
  • Managed Services: We provide 24/7 managed cyber security services, working as an extension to your in house team or as your dedicated managed services partner. You will benefit from the skills and expertise of our team, the cost efficiency and flexibility that comes with outsourcing to a specialist service provider.
  • Cyber Security Solutions: We work in partnership with hand-picked, industry leading solution providers, carefully selected for quality, effectiveness and to complement the services we offer.

Defending businesses against cyber attacks since 2007.