Razorwire Cyber Security & InfoSec Insights cover art

All Episodes

Razorwire Cyber Security & InfoSec Insights — 97 episodes

#
Title
1

Useful or Spam? A CISO's Guide to Vendor Outreach

2

Project Glasswing. What Anthropic's Mythos Means for Cybersecurity

3

The Rise of CTEM - Why AI Demands a New Approach to Security

4

All the Gear and No Idea: What's Actually Going Wrong in Security with Gary Hibberd

5

Trust Nothing: The Rise of Deepfakes in Cybercrime

6

From Security Theatre to Real Resilience: Why Most Incident Response Plans Fall Apart

7

No Honour Amongst Thieves: The Hidden World of Hackers and Cyber Criminals

8

What’s Making 2026 the Toughest Year Yet for CISOs

9

Cryptocurrency: Good, Bad or Evil?

10

The Razorwire Christmas Special 2025: Looking Back, Looking Forward

11

Burnout in Cybersecurity: Preparing Cyber Staff for the Reality, Not Just the Role

12

The Death of Passwords: The Future of Authentication

13

How to Build Effective & Affordable Cyber Defences for SMEs

14

How Cybercriminals are using AI - and How to Defend Against It

15

What Actually Works in Cybersecurity (And What Doesn't)

16

The Hidden Costs of Security Stack Consolidation (That Vendors Don't Mention)

17

The Psychological Toll of Working in Cybersecurity - When You Can't Unsee What You've Seen

18

Hacking AI: The Risks for Businesses

19

Streamlining the Compliance Journey - An End-to-End Approach

20

Venture Capital's Cybersecurity Crisis: No Money, No Innovation, No Future?

21

The SME Cybersecurity Revolution: How Coro Cracked the Code

22

Human Risk Intelligence: Is Behavioural Data the New Defence?

23

Inside the Early Lessons of DORA Compliance: What Works, What Fails, What’s Next?

24

NHS Cybersecurity Crisis: Who is Actually Protecting Your Medical Records?

25

How Do You Safeguard AI When Development Outpaces Security? With Ante Gojsalić - SplxAI

26

How To Get Your Staff to Actually Care About Cybersecurity

27

Security Gone Mad: The Fine Art of Overdoing It

28

Unconventional Paths to Cybersecurity (AKA keeping your Nan Safe From Hackers)

29

Mastering the Art of Communication in InfoSec

30

Spotlight on Technology: Mastering Attack Surface Management

31

AI Data Harvesting - Who Really Owns Your Digital Footprint?

32

Inside Incident Response: Turning Chaos into Cohesive Teamwork

33

The Cost of Being a CISO Part 2: Ethics, Leadership and Strategic Impact

34

Cybersecurity 2025 – Predictions from the Experts

35

Supercharge Your Security Budget in 2025: Smarter Investments, Stronger Defence

36

The Cost of Being A CISO Part 1: Personal, Professional & Organisational Challenges

37

Humans vs AI: Building a Security Culture That Actually Works with Noora Ahmed-Moshe

38

Mental Health, Organisational Culture & The Human Side of Cybersecurity

39

Insider Threats & Third Party Risk: How to Manage Security Threats

40

How to Optimise Your GRC Tools

41

Navigating Mental Health, Narcissism & Burnout in Cybersecurity with Lisa Ventura MBE

42

ChatGPT vs Cyber Threats: The REAL Role of AI in Cybersecurity

43

DORA & NIS2: The Cybersecurity Regulation Revolution

44

Contextual Security and Beyond: The Future of Cybersecurity

45

Top Cybersecurity Priorities for 2024

46

DORA is Coming: Is Your Financial Institution Ready for the Digital Resilience Revolution?

47

Secrets of a Cyber CEO: The Truth About Running a Cybersecurity Business

48

Redefining Cyber Insurance to Meet Today’s Cybersecurity Challenges

49

What Really Grinds My Gears In Infosec!

50

The Art of Cyber Deception: How To Get Inside The Mind of A Hacker with Rob Black

51

Trust vs Control – Is Zero Trust Inevitable?

52

Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters

53

Cybersecurity Burnout and Organisational Culture with Yanya Viskovich & Eve Parmiter

54

The Impact of FAIR on Risk Management with Jack Jones

55

The Real Impact of the Lockbit Ransomware Takedown

56

The Rise of Cyber Mercenaries: Governments' Secret Weapons in Cyber Warfare

57

Trends in Identity and Access Management with Simon Moffatt

58

Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

59

Cybersecurity in 2024: Expert Predictions You Need to Know

60

Beyond Buzzwords: The Truth About AI

61

Unleashing the Hidden World of Cybercriminals: The Growing Threat of Cybercrime-as-a-Service

62

SolarWinds’ CISO Under SEC Scrutiny: The Impact On The Infosec Community

63

Decoding Generative AI: Myths, Realities and Cybersecurity Insights

64

Lessons from an InfoSec Icon: A Fireside Chat with PCI Guru Jeff Hall

65

The Use Of AI In Cybersecurity - Consultants Roundtable

66

Cyber Insurance - Does it Create More Problems than it Solves?

67

The Human Psychology Behind Cybersecurity With Bec McKeown

68

DORA Compliance Made Clear Essential Training for Safeguarding Financial Institutions w Paul Dwyer

69

Modern Cybersecurity: Post Pandemic Review Of Defence in Depth

70

The Effects On Cybersecurity & Infosec of Economic Downturns

71

Breaking Into Cybersecurity: Essential Tips for Newbies

72

What To Do If You Are A Victim Cybercrime: The Anatomy Of High Profile Incident

73

The Reality Of Cyber Warfare

74

Security vs Privacy: The Ethics of Data Collection

75

Navigating the Turbulent Waters of Cybersecurity: Nationalism, Economics And AI

76

ChatGPT Reveals Top 5 Cybersecurity Concerns for Businesses

77

Trust & Culture as Cornerstones of Cyber Security with Paul Dwyer

78

Cyber security and Critical Infrastructure: Are We Prepared for the Worst?

79

Defence in Depth: Strengthening your Cyber Security Strategy

80

A Snapshot in Time: Why Penetration Testing Is Critical for Cyber Security

81

Strengthening Cyber Security: The Impact of Compliance and Legislation

82

Ransomware Sanctions: Exploring the Fallout

83

How to Negotiate with Ransomware Groups

84

The Business of Biometrics: Data Protection and Ethical Standards in Cyber Security

85

Ex-Military Cyber Security Experts: How Military Training Prepares You for a Successful Career in Cybersecurity

86

Closing the Cybersecurity Skills Gap: Strategies for Finding and Developing Talent

87

Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential

88

Evaluating the Effectiveness of Cyber Insurance: Is It Fit For Purpose?

89

Criminal Minds: How the Cyber Crime World Works

90

Women in Cyber Security

91

Cyber Security Professionals Shortage, Burnout & How To Protect Against It

92

The Evolution Of Cyber Security & Trends To Watch For

93

Machine Learning, AI & Cyber Security Part 2: Malicious Actors

94

Machine Learning, AI & Cyber Security Part 1: Used for Good

95

The Future Of Security For Working From Home

96

Where Should A CISO Sit Within An Organisation?

97

Razorwire Cyber Security Podcast Trailer