From the Blog

10 October

Your perception of Cyber Attacks is probably wrong

Cyber Attack Hacking Myths Cyber attacks can be performed for either criminal, terrorist, activism or political gain.  In the end though, they all use similar Tactics, Techniques and Procedures (TTPs) to achieve their ultimate goals. From a criminal point of view, finical institutions have often bared the brunt of the hacker’s target sights. However, now […]

4 October

10 Key Actions to Reduce your Cyber Risk

Razorthorn works closely with our clients to develop and supply world leading cyber monitoring and response services and we have many years’ experience in developing and running advanced services that allow our clients to deal with all types of cyber-attacks including APT’s. During our work with our clients and partners we often come across some […]

4 October

Latest DDoS Trends – Q1 2016

Overall Trends for DDoS Attacks In the first quarter of 2016, we saw perpetrators experiment with elaborate tools and attack methods to carry out DDoS and DoS assaults. In the case of application layer attacks, this resulted in the expanded use of browser-like DDoS bots capable of bypassing standard security challenges. The use of these […]


What our customers are saying.

  • Training Customer

    “They are a great team with a great philosophy towards collaborative learning and teaching. Ensuring the delivery of their material directly relates to real-world events and individual engagement is of the upmost importance to Razor Thorn! I highly recommend Razor Thorn and continue to work with them today.”

    - Training Customer

Information Security Consultancy

Razorthorn was founded in 2007 and since that time have become a leading provider of trusted Information Security Consultancy for companies and institutions of all sizes on the subject of Cyber Security and Information Security.

With offices in London and New York we are a truly global organisation who prides itself on quality and discretion at all times.

Razorthorn Ltd is a dedicated Information Security Consultancy with an international presence that helps its clients to take an integrated approach to Information security and Cyber intelligence ensuring the main pillars of People, Process and Technology are always included in the information life-cycle. Our belief in quality and discretion drives everything, resulting in satisfied, long term clients.

We specialize in building end-to-end Cyber strategies for companies, building true cyber threat intelligence, evaluating their major weak points and vulnerabilities before putting in a place a plan of action that will increase Total-Control of their cyber presence.

We provide cyber Intelligence and threat analysis and a range of services from ad hoc consultancy to fully managed information security services. Razorthorn helps clients manage complex security needs from conducting audit and compliance reviews, embedding risk and compliance methodologies and technical cyber services and intelligence.

If you are looking to outsource parts of your information security consultancy needs then we can help. We have dedicated teams of specialist who can manage development and delivery of Governance, Risk and Compliance processes and technology across your organization.

Consultancy Services
•    Information Governance, Risk and Compliance
•    Information Security Polices & Standards development
•    PCI and ISO preparation and Certification
•    Information Security and IT Technical Reviews
•    Security Architecture and Design

Technology Services
•    Cyber Intelligence automated tool-set
•    Pen Testing and Vulnerability Management
•    Web Application Security
•    DDoS Protection
•    Database Security
•    File Security
•    SharePoint Security
•    Cloud Security