Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Redefining Cyber Insurance to Meet Today's Cybersecurity Challenges

Is Your Business Insurance Keeping Pace with Evolving Cyber Threats? Welcome to another episode of Razorwire! I'm your host, Jim, and today we dive deep into the dynamic world of cyber insurance. Neil Hare-Brown and Matt Clark, two industry experts, join us to share their insights on how cyber insurance has adapted to meet today's security challenges. Tune in to discover how cyber insurance can be an integral part of your organisation's defence strategy and ensure you're prepared for whatever comes your way.

What Really Grinds My Gears In Infosec!

Welcome to Razorwire! Join me, Jim, and my guests Chris Dawson and Iain Pye, as we dive into the daily frustrations and pressing issues facing cybersecurity professionals. This episode is filled with insights, gripes, and laughable clichés that saturate our industry. From award ceremony hype to exaggerated LinkedIn credentials, we tackle it all. Stay tuned and subscribe for a candid look at the ups and downs of working in infosec.

Deception as a Defence: Slowing Down Attackers with Psychological Tactics | Razorthorn Security

Discover how the NSA used deception to slow down attackers in this clip with Robert Black. By merely informing attackers that deception was deployed, their progress was significantly hindered. Explore the psychological impact of such tactics on cybersecurity defences.

The Evolution of Honeypots: From Traps to Intelligence Tools | Razorthorn Security

Robert Black discusses the historical and modern uses of honeypots in cybersecurity. Initially designed as traps, these tools now serve as valuable sources of intelligence, helping organizations understand attacker behaviors and enhance defenses. Learn how deception technology has evolved over time.

The Stuxnet Lesson: Trust and Deception in Cybersecurity | Razorthorn Security

Robert Black recounts the famous Stuxnet attack on Iranian nuclear facilities, highlighting the role of deception. By making systems appear normal to attackers, significant damage was done without immediate detection. Understand the power of trust and deception in cybersecurity defense strategies.