Razorwire Cyber Security

By Razorthorn Security

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 5
Reviews: 0
Episodes: 47

Description

Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on the strength and depth of your own knowledge and experience. Your host James Rees is an information security veteran with over 25 years of industry experience and is the founder of Razorthorn Security, delivering expert security consultancy and testing services on a day to day basis to some of the largest and most influential organisations in the world, including many in the Fortune 500. The Razorwire podcast is for cyber security professionals looking for new ideas and the drive to improve their response to cyber security events. Through collaboration, we can strengthen our defences. For more information about us or if you have any questions you would like us to discuss on the podcast email podcast@razorthorn.com or head to www.razorthorn.com This podcast uses the following third-party services for analysis: Chartable - https://chartable.com/privacy

Episode Date
Trust vs Control – Is Zero Trust Inevitable?
May 15, 2024
Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters
May 01, 2024
Cybersecurity Burnout and Organisational Culture with Yanya Viskovich & Eve Parmiter
Apr 17, 2024
The Impact of FAIR on Risk Management with Jack Jones
Apr 03, 2024
The Real Impact of the Lockbit Ransomware Takedown
Mar 20, 2024
The Rise of Cyber Mercenaries: Governments' Secret Weapons in Cyber Warfare
Mar 06, 2024
Trends in Identity and Access Management with Simon Moffatt
Feb 21, 2024
Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure
Feb 07, 2024
Cybersecurity in 2024: Expert Predictions You Need to Know
Jan 24, 2024
Beyond Buzzwords: The Truth About AI
Jan 10, 2024
Unleashing the Hidden World of Cybercriminals: The Growing Threat of Cybercrime-as-a-Service
Dec 20, 2023
SolarWinds’ CISO Under SEC Scrutiny: The Impact On The Infosec Community
Dec 06, 2023
Decoding Generative AI: Myths, Realities and Cybersecurity Insights
Nov 22, 2023
Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall
Nov 08, 2023
The Use Of AI In Cybersecurity - Consultants Roundtable
Oct 25, 2023
Cyber Insurance - Does it Create More Problems than it Solves?
Oct 11, 2023
The Human Psychology Behind Cybersecurity With Bec McKeown
Sep 27, 2023
DORA Compliance Made Clear Essential Training for Safeguarding Financial Institutions w Paul Dwyer
Sep 13, 2023
Modern Cybersecurity: Post Pandemic Review Of Defence in Depth
Aug 30, 2023
The Effects On Cybersecurity & Infosec of Economic Downturns
Aug 16, 2023
Breaking Into Cybersecurity: Essential Tips for Newbies
Aug 02, 2023
What To Do If You Are A Victim Cybercrime: The Anatomy Of High Profile Incident
Jul 19, 2023
The Reality Of Cyber Warfare
Jul 05, 2023
Security vs Privacy: The Ethics of Data Collection
Jun 21, 2023
Navigating the Turbulent Waters of Cybersecurity: Nationalism, Economics And AI
Jun 07, 2023
ChatGPT Reveals Top 5 Cybersecurity Concerns for Businesses
May 24, 2023
Trust & Culture as Cornerstones of Cyber Security with Paul Dwyer
May 10, 2023
Cyber security and Critical Infrastructure: Are We Prepared for the Worst?
Apr 26, 2023
Defence in Depth: Strengthening your Cyber Security Strategy
Apr 12, 2023
A Snapshot in Time: Why Penetration Testing Is Critical for Cyber Security
Mar 29, 2023
Strengthening Cyber Security: The Impact of Compliance and Legislation
Mar 15, 2023
Ransomware Sanctions: Exploring the Fallout
Mar 01, 2023
How to Negotiate with Ransomware Groups
Feb 15, 2023
The Business of Biometrics: Data Protection and Ethical Standards in Cyber Security
Feb 01, 2023
Ex-Military Cyber Security Experts: How Military Training Prepares You for a Successful Career in Cybersecurity
Jan 18, 2023
Closing the Cybersecurity Skills Gap: Strategies for Finding and Developing Talent
Dec 07, 2022
Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential
Nov 23, 2022
Evaluating the Effectiveness of Cyber Insurance: Is It Fit For Purpose?
Nov 09, 2022
Criminal Minds: How the Cyber Crime World Works
Oct 26, 2022
Women in Cyber Security
Oct 12, 2022
Cyber Security Professionals Shortage, Burnout & How To Protect Against It
Sep 28, 2022
The Evolution Of Cyber Security & Trends To Watch For
Sep 14, 2022
Machine Learning, AI & Cyber Security Part 2: Malicious Actors
Aug 31, 2022
Machine Learning, AI & Cyber Security Part 1: Used for Good
Aug 17, 2022
The Future Of Security For Working From Home
Aug 03, 2022
Where Should A CISO Sit Within An Organisation?
Jul 27, 2022
Razorwire Cyber Security Podcast Trailer
Jul 18, 2022