
BitLocker in crisis? The “YellowKey” zero-day in plain English
Nightmare Eclipse hates Microsoft, loves dropping 0-days.
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

The thought of the Rams going onto the field with the 49ers without first spending months practicing would be unheard of. And the same is true of responding to cyberattacks in a company. Firefighters do fire drills. Actors do dress rehearsals. And IT and security teams do tabletop exercises. Tabletop exercises are a low-stress rehearsal of what might arise during an emergency situation. In this case, a cyberattack. Participants sit and discuss a scenario and their potential responses to it. […]

A swift and adequate response to an active cybersecurity threat can mean the difference between your company surviving the incident or going under. Small to mid-sized enterprises (SMEs) are especially at risk because they are looked upon as low-hanging fruit by hackers and they tend to have fewer defense and response mechanisms in place than larger corporations, especially because of budget constraints. According to IBM’s Cost of a Data Breach Report for 2021, the average cost of a breach was […]


The year 2021 saw ransomware attacks rising by a jaw-dropping 92%. And 22 billion records were exposed across 4,145 publicly disclosed attacks. Considering that a breach will cost companies an average of $4.5 million, the need for cyber insurance has never been so high. But what is cyber insurance exactly, and is it right for your business and industry? In this article, we will try and answer the questions most frequently asked about cyber insurance. 1. What exactly is cyber […]

In September 2022, an 18-year-old hacker leveraged sophisticated social engineering techniques to smash into Uber’s network. Once inside, the hacker rummaged through a file share and found privileged credentials that gave access to enormous swathes of Uber’s source code and corporate cloud platforms. Luckily, no trip data was taken, according to Uber. But trusting luck is a terrible strategy for cybersecurity. How did the Uber hack happen? According to an official statement by Uber, the breach was carried out when […]

As organizations mature, they are exposed to ever-increasing internal and external risks. Internally, from the danger of executing projects with the same entrenched and unsecured processes. Externally, from the threat of cyberattacks that take advantage of any chink in the security armor. Few initiatives sit at the intersection of these concerns as the creation of a Security Operations Center (SOC). Building a SOC requires new tools and technology, diligent work with partners and vendors, as well as successful recruitment and […]

“A lock only keeps honest people out.” With the current cybersecurity threat landscape, SMEs need to secure their organization to lower their exposure to risk. While there are a lot of tools available that are designed to mitigate or prevent threats, employing the proper framework and approach that aligns with your cybersecurity goals will make the most difference in your planning efforts. Modern threats require modern approaches, and we can only prevent what we can anticipate. Because of this, it’s […]

Why oh why is cybersecurity so complex? I was at an event recently and the keynote speaker talked about how security is unique in its incredibly minimal consolidation. In the cloud, you have arguably three major players (Amazon, Microsoft, and Google). In mobile phones a few. In almost any area of life, consolidation happens (auto’s maybe 10, TV’s 3-4, etc). Yet, in information security, no one company has greater than 5% of the market. The equivalent of cyber security is […]

The small to mid-sized enterprise (SME) market is wildly underserved in the cybersecurity sector, opening up massive opportunities for Managed Security Service Providers (MSSPs), as well as Managed Service Providers (MSPs) who could benefit from offering stronger security services as part of their overall IT offering. Many MSPs are tempted to build out a security practice but this requires extensive investment and more importantly, will take time before the offering ever hits the market. Partnering with a MSSP can be […]

Software vulnerabilities are a fact of life with more identified every day. In 2021, 28,695 new vulnerabilities were discovered in production software. These vulnerabilities can potentially create a backdoor to companies, letting attackers come in and out as they please. However, some vulnerabilities are significantly more dangerous than others with widespread impact. Many of these high-impact vulnerabilities — such as Log4j and Follina — are zero-days, where vulnerabilities are exploited by cyber threat actors in the wild before they become […]

Risk management is a core part of any organization’s business processes. Without the ability to manage risk, an unforeseen event could put the company out of business. Effective and comprehensive risk management requires an understanding of what can go wrong, how to minimize the probability of a risk event occurring, and how to recover if something does go wrong. In many ways, managing risk for the business is similar to owning a car. Car ownership comes with significant risks and […]

SMEs have little wiggle room regarding cybersecurity. Smaller budgets and fewer dedicated security resources mean that cyberattack attempts are more likely to penetrate an SME’s defenses than those of a larger company. Forty-three percent of all cyberattacks are aimed directly at small to medium businesses, and only 14% of SMEs are ready to defend against those attacks, according to a study by Accenture. Aside from being extremely inconvenient, these data breaches also get expensive. The cost of data breaches to […]


Cybersecurity has become a top-of-mind concern for many organizations. The cyber threat landscape is evolving rapidly, and companies face near-constant attacks. These attacks are growing more sophisticated and subtle as well, making them more difficult to detect and remediate. At the same time, companies face significant barriers to their ability to protect themselves against these attacks. The cybersecurity industry is facing a significant talent shortage, making it difficult for organizations to attract and retain the cybersecurity professionals that they need […]

Risk management is an important part of the investors’ job. If a business they capitalize suffers significant losses due to various risks, the value of that business decreases, and the investors lose money. Investors must consider a variety of different potential risks to organizations they are considering as targets. Before committing funds, they’ll need to account for financial, compliance, reputational, and other risks to the business. However, in addition to the factors above, cyber risks have emerged as another major […]

It’s been one year since we’ve come out of stealth, and it’s been an incredible experience for the whole team at SolCyber. It’s heartening to see how much progress we’ve made in the relatively short time since my first blog post introduced SolCyber to the market. Our mission of enabling small to mid-sized enterprises (SMEs) easy access to effective and affordable security has only been spurred on by the validation and feedback we’re receiving. As a CEO, there’s tremendous pressure […]

The thought of the Rams going onto the field with the 49ers without first spending months practicing would be unheard of. And the same is true of responding to cyberattacks in a company. Firefighters do fire drills. Actors do dress rehearsals. And IT and security teams do tabletop exercises. Tabletop exercises are a low-stress rehearsal of what might arise during an emergency situation. In this case, a cyberattack. Participants sit and discuss a scenario and their potential responses to it. […]

A swift and adequate response to an active cybersecurity threat can mean the difference between your company surviving the incident or going under. Small to mid-sized enterprises (SMEs) are especially at risk because they are looked upon as low-hanging fruit by hackers and they tend to have fewer defense and response mechanisms in place than larger corporations, especially because of budget constraints. According to IBM’s Cost of a Data Breach Report for 2021, the average cost of a breach was […]

The year 2021 saw ransomware attacks rising by a jaw-dropping 92%. And 22 billion records were exposed across 4,145 publicly disclosed attacks. Considering that a breach will cost companies an average of $4.5 million, the need for cyber insurance has never been so high. But what is cyber insurance exactly, and is it right for your business and industry? In this article, we will try and answer the questions most frequently asked about cyber insurance. 1. What exactly is cyber […]
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

In September 2022, an 18-year-old hacker leveraged sophisticated social engineering techniques to smash into Uber’s network. Once inside, the hacker rummaged through a file share and found privileged credentials that gave access to enormous swathes of Uber’s source code and corporate cloud platforms. Luckily, no trip data was taken, according to Uber. But trusting luck is a terrible strategy for cybersecurity. How did the Uber hack happen? According to an official statement by Uber, the breach was carried out when […]

As organizations mature, they are exposed to ever-increasing internal and external risks. Internally, from the danger of executing projects with the same entrenched and unsecured processes. Externally, from the threat of cyberattacks that take advantage of any chink in the security armor. Few initiatives sit at the intersection of these concerns as the creation of a Security Operations Center (SOC). Building a SOC requires new tools and technology, diligent work with partners and vendors, as well as successful recruitment and […]

“A lock only keeps honest people out.” With the current cybersecurity threat landscape, SMEs need to secure their organization to lower their exposure to risk. While there are a lot of tools available that are designed to mitigate or prevent threats, employing the proper framework and approach that aligns with your cybersecurity goals will make the most difference in your planning efforts. Modern threats require modern approaches, and we can only prevent what we can anticipate. Because of this, it’s […]


Why oh why is cybersecurity so complex? I was at an event recently and the keynote speaker talked about how security is unique in its incredibly minimal consolidation. In the cloud, you have arguably three major players (Amazon, Microsoft, and Google). In mobile phones a few. In almost any area of life, consolidation happens (auto’s maybe 10, TV’s 3-4, etc). Yet, in information security, no one company has greater than 5% of the market. The equivalent of cyber security is […]




SMEs have little wiggle room regarding cybersecurity. Smaller budgets and fewer dedicated security resources mean that cyberattack attempts are more likely to penetrate an SME’s defenses than those of a larger company. Forty-three percent of all cyberattacks are aimed directly at small to medium businesses, and only 14% of SMEs are ready to defend against those attacks, according to a study by Accenture. Aside from being extremely inconvenient, these data breaches also get expensive. The cost of data breaches to […]

Cybersecurity has become a top-of-mind concern for many organizations. The cyber threat landscape is evolving rapidly, and companies face near-constant attacks. These attacks are growing more sophisticated and subtle as well, making them more difficult to detect and remediate. At the same time, companies face significant barriers to their ability to protect themselves against these attacks. The cybersecurity industry is facing a significant talent shortage, making it difficult for organizations to attract and retain the cybersecurity professionals that they need […]

Risk management is an important part of the investors’ job. If a business they capitalize suffers significant losses due to various risks, the value of that business decreases, and the investors lose money. Investors must consider a variety of different potential risks to organizations they are considering as targets. Before committing funds, they’ll need to account for financial, compliance, reputational, and other risks to the business. However, in addition to the factors above, cyber risks have emerged as another major […]

It’s been one year since we’ve come out of stealth, and it’s been an incredible experience for the whole team at SolCyber. It’s heartening to see how much progress we’ve made in the relatively short time since my first blog post introduced SolCyber to the market. Our mission of enabling small to mid-sized enterprises (SMEs) easy access to effective and affordable security has only been spurred on by the validation and feedback we’re receiving. As a CEO, there’s tremendous pressure […]


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






