
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

It’s binding for federal agencies, but worth your attention even if you’re not bound by it yourself.

The biggest threat in 2026 isn’t going to be a new AI-enabled social engineering scam – it’s more likely to be cyber fatigue.


Bad news for the crooks, and even worse news for their victims.

Cybercrime today has become about business models and automation rather than direct hacking and espionage.

Ah, the irony!

Supply chain hacks are high impact. The average cost of a breach is $4.4 million.

An informed and entertaining look at the sort of long-standing bugs and blunders we could so easily have avoided, but didn’t.

10 years on, and still not patched.

I’m sorry, Dave. I’m afraid I can’t do that.

Just how safe is it to store passwords in your browser’s password manager?

A breach, or not a breach? That is the question…


Even when your supply chain isn’t buggy, you still need to know what’s in it.

Our plain-speaking duo celebrate Sysmas, because ’tis the season to be thankful for the Sysadmins and SOCstars who keep us safe.

1987 had shoulder pads, mullets, and emailed malware. One vanished, one made a comeback, but the third never went away…

It’s binding for federal agencies, but worth your attention even if you’re not bound by it yourself.

The biggest threat in 2026 isn’t going to be a new AI-enabled social engineering scam – it’s more likely to be cyber fatigue.

Bad news for the crooks, and even worse news for their victims.
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

Cybercrime today has become about business models and automation rather than direct hacking and espionage.

Ah, the irony!

Supply chain hacks are high impact. The average cost of a breach is $4.4 million.


An informed and entertaining look at the sort of long-standing bugs and blunders we could so easily have avoided, but didn’t.




A breach, or not a breach? That is the question…

Even when your supply chain isn’t buggy, you still need to know what’s in it.

Our plain-speaking duo celebrate Sysmas, because ’tis the season to be thankful for the Sysadmins and SOCstars who keep us safe.

1987 had shoulder pads, mullets, and emailed malware. One vanished, one made a comeback, but the third never went away…


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






