
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Media headlines insisted that “RSA has been cracked.” But it hasn’t, so why did they say it had?

There’s no getting around it — the cloud is a necessity for modern businesses. These days it’s nearly impossible to run a business without interacting with the cloud in some way. While most businesses rely on cloud-based tools to conduct day-to-day operations, these tools also significantly expand a company’s attack surface. Cloud-related attacks are one of the top threats for businesses, with 80% of companies seeing an increase in the frequency of attacks in their cloud environments. Whether you’re storing […]


What sort of data collection is “fair and reasonable” when it’s your car doing the collecting?

Even if you’ve got cybersecurity covered in your own digital life, remember that friends don’t let friends get scammed!

In the last decade, cloud technology has become incredibly pervasive and a necessity for most businesses, especially those offering hybrid or remote work environments. According to G2, virtually all companies use at least one public or private cloud, and 85% of organizations will be “cloud first” by 2025. Even more important (from a security standpoint) is the fact that more than 60% of all corporate data is stored in the cloud. This data can be stored on cloud service providers […]

You’ve put a lock on your door. Why not add eight more, just to be sure? The cybersecurity industry will sell you as many tools as you are willing to buy, so why not run them all?

Learn what SOC 2 tells you about your suppliers, as well as how to make the most of the experience if you’re thinking of going for SOC 2 in your own business.

Join us for the fascinating story of how researchers in the UK and the US challenged received wisdom, and discovered how to share encryption keys securely, even with people you’ve never met.

Join us for the fascinating story of how researchers in the UK and the US challenged received wisdom, and discovered how to share encryption keys securely, even with people you’ve never met.

Data breaches are at an all-time high, with the number of breaches almost doubling from 2022 to 2023. Most recently, CBS reported on a massive data breach that could likely contain the social security numbers (SSNs) of every US citizen. It’s a major leak of personally identifiable information (PII) and only adds to the amount of sensitive data, such as passwords and addresses, that has been leaked over the last decade. Although it’s easy to think that leaked PII in […]

Romance scams often lead to victim blaming. What can we do to avoid them, and to keep our own vulnerable friends and family safe?


The cybersecurity vendor market is quite complicated and it’s easy to get lost in the acronym soup. Whether it’s to make their product sound different or just the proclivity of the tech industry to abbreviate everything, it can be incredibly challenging for non-security people to understand what’s important and what isn’t. Making matters worse, many of the services overlap, meaning that you can invest in two “different” services or platforms and end up getting the same thing in both. One […]

Startup valuations are the scoreboard of success, and the podium for winners is Unicorn Status—when a company reaches a valuation of $1 billion. Achieving unicorn status is the dream of any startup, and it typically signals the startup’s strong potential to either go through an IPO or become acquired by a larger firm in an M&A deal. A start-up achieves unicorn status if: Unfortunately, because it might have vulnerabilities that more established, public companies don’t, achieving unicorn status also puts […]

What if we look beyond cybersecurity automation and algorithms?
What if we start out with a focus on cybersecurity culture, not on rules and rote?

Media headlines insisted that “RSA has been cracked.” But it hasn’t, so why did they say it had?

There’s no getting around it — the cloud is a necessity for modern businesses. These days it’s nearly impossible to run a business without interacting with the cloud in some way. While most businesses rely on cloud-based tools to conduct day-to-day operations, these tools also significantly expand a company’s attack surface. Cloud-related attacks are one of the top threats for businesses, with 80% of companies seeing an increase in the frequency of attacks in their cloud environments. Whether you’re storing […]

What sort of data collection is “fair and reasonable” when it’s your car doing the collecting?
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Even if you’ve got cybersecurity covered in your own digital life, remember that friends don’t let friends get scammed!

In the last decade, cloud technology has become incredibly pervasive and a necessity for most businesses, especially those offering hybrid or remote work environments. According to G2, virtually all companies use at least one public or private cloud, and 85% of organizations will be “cloud first” by 2025. Even more important (from a security standpoint) is the fact that more than 60% of all corporate data is stored in the cloud. This data can be stored on cloud service providers […]

You’ve put a lock on your door. Why not add eight more, just to be sure? The cybersecurity industry will sell you as many tools as you are willing to buy, so why not run them all?


Learn what SOC 2 tells you about your suppliers, as well as how to make the most of the experience if you’re thinking of going for SOC 2 in your own business.




Romance scams often lead to victim blaming. What can we do to avoid them, and to keep our own vulnerable friends and family safe?

The cybersecurity vendor market is quite complicated and it’s easy to get lost in the acronym soup. Whether it’s to make their product sound different or just the proclivity of the tech industry to abbreviate everything, it can be incredibly challenging for non-security people to understand what’s important and what isn’t. Making matters worse, many of the services overlap, meaning that you can invest in two “different” services or platforms and end up getting the same thing in both. One […]

Startup valuations are the scoreboard of success, and the podium for winners is Unicorn Status—when a company reaches a valuation of $1 billion. Achieving unicorn status is the dream of any startup, and it typically signals the startup’s strong potential to either go through an IPO or become acquired by a larger firm in an M&A deal. A start-up achieves unicorn status if: Unfortunately, because it might have vulnerabilities that more established, public companies don’t, achieving unicorn status also puts […]

What if we look beyond cybersecurity automation and algorithms?
What if we start out with a focus on cybersecurity culture, not on rules and rote?


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






