
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

As public clouds supersede the datacenter for our customers, it’s not enough to represent just one facet of a general trend toward the dissolution of traditional perimeters. This trend requires a novel and comprehensive suite of controls around identity, configuration management, and endpoints, which represent the new attack surface. Ermetic provides crucial analysis of these modern infrastructure fixtures which is essential to delivering robust managed security to our customers. To launch our partnership with Ermetic, we talk to Arick Goomanovsky, […]

Small businesses suffer 43% of all cyberattacks, according to data from Accenture, but only 14% of small businesses are ready to defend themselves. Considering that cybersecurity incidents cost businesses an average of $200,000 and that 60% of small businesses will go out of business within six months of an attack, cybersecurity should be a top-of-mind concern for small to mid-sized enterprises (SMEs). Email is an enormous attack vector for SMEs, and it is often the doorway to much more sophisticated […]


In the past, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) performed very different roles. MSPs were responsible for an organization’s IT infrastructure (storage, desktop management, backups, network, etc.), and MSSPs focused on protecting the organization against cyber threats. However, as cybersecurity becomes of increasing concern for companies, the lines between MSPs and MSSPs have begun to blur. In addition to managing companies’ IT infrastructure, MSPs have begun pivoting to becoming MSSPs as well. However, the services that […]

As the cyber threat landscape evolves, cybercrime is becoming more professional, leading to more frequent and sophisticated attacks. All businesses are experiencing increased cyber risk – no one is excluded. Mergers and acquisitions can cause an even higher period of risk as cybercriminals take advantage of the confusion, disarray, and shift in processes that can reduce an organization’s ability to detect and respond to potential attacks. Since small businesses make up a significant portion of acquisitions, they are a common […]

Traditionally, cybersecurity fell under the jurisdiction of IT, tech, or product teams and was overseen by the CISO. While these teams are still the primary players in cybersecurity decisions, the risk landscape is expanding, causing many companies to shift their thinking when it comes to cyber risk and cybersecurity. Because potential cyberattacks pose a larger risk to a business, the entire leadership team and the board (if it exists) should become key stakeholders over a business’ security efforts. The person […]

Remember the good old days when ransomware wasn’t so rampant across industries and all types of companies, large and small? Us too. Unfortunately, the way in which hackers are using ransomware has changed significantly in the last several years, leaving every company vulnerable. So, many companies have turned to cyber insurance to protect their bottom line in the case of an attack. A recent SonicWall 2022 Cyber Threat Report claimed that governments around the world saw a 1,885% increase in […]

Any investment comes with an element of risk, and when you’re conducting due diligence on a potential startup or are working to mature a company in your portfolio, cybersecurity risk should be assessed and considered as early as possible. That’s because it can quickly spiral out of control and result in financial, reputational, continuity, legal, and compliance risk to the company and the investors In the past, cybersecurity might seem like something that could have been kicked down the line, […]

Many small and mid-sized enterprises (SMEs) choose not to invest in cybersecurity early on, and it’s understandable why, given its impact to the bottom line. Cybersecurity tools, software and services can be expensive, and it’s time consuming to determine which tools you need. You need to weed through more than 3,500 vendors offering solutions and the process of finding the right vendors and onboarding them can take years. Fast-moving startups and SMEs neither have the expertise, time or the money. […]

7 costs of a data breach and how to minimize them It’s no secret that data breaches are occurring more frequently and they’re expensive. Just turn on the news and you’re sure to hear a story about the millions a major company lost thanks to a leak. Unfortunately, in too many cases, businesses experience a costly breach that could have been prevented. Something as simple as a misconfigured or insecure firewall or lack of two-factor authentication can cost a company […]

Given sufficient time, resources, and motivation, a cyber threat group can breach any organization. While prevention is important, companies should treat data breaches as inevitable and ensure that they are prepared to handle them and minimize their impact. According to the 2021 Cost of a Data Breach Report developed by Ponemon and IBM, the average cost of a data breach is $4.24 million. However, having an incident response (IR) plan in place is one of the best ways to drive […]

Cyberattacks have become a risk that all organizations need to address. As cybercrime has become more organized and professionalized, cyberattacks have also become more numerous, automated, and sophisticated. The reality is that any company can be the target of a cyberattack, and prevention is not enough to protect an organization. Even the most effective cyber solution will miss some attacks so organizations need to be prepared to address an attack at every stage of the kill chain (see diagram below). […]


We discuss what to consider before buying in. The cybersecurity market is complex, to say the least. The current market has over 3500 vendors with new ones being added daily. Coupled with the fact that the threat landscape keeps changing, it’s difficult for any security or risk leaders, especially those in SMEs, to know how to navigate this environment. Does a new threat or risk require a new tool, or does a current vendor have it covered? Vendors aren’t making […]

A majority of small and mid-sized enterprises (SME) have outstanding debt. It’s the cost of growing a business. But you might be surprised to know that your debt can extend far beyond the money owed to a lender. Many SMEs are also accumulating technical debt — the costs associated with reworking code, products, and solutions that have been improperly implemented to deliver a product more quickly. One of the more costly types of technical debt is cyber debt. Cyber debt […]

The world is watching the terrible conflict currently happening in Ukraine. Russia has attacked the nation in more ways than one, including leveraging cyberattacks as part of the escalating discord. SolCyber, and the information security sector as a whole is on high alert and we recommend organizations know what the elevated risk is and what they can expect from the conflict. CISA, The U.S. Cybersecurity & Infrastructure Security Agency, has issued a “Shields Up” warning to all businesses as a […]

As public clouds supersede the datacenter for our customers, it’s not enough to represent just one facet of a general trend toward the dissolution of traditional perimeters. This trend requires a novel and comprehensive suite of controls around identity, configuration management, and endpoints, which represent the new attack surface. Ermetic provides crucial analysis of these modern infrastructure fixtures which is essential to delivering robust managed security to our customers. To launch our partnership with Ermetic, we talk to Arick Goomanovsky, […]

Small businesses suffer 43% of all cyberattacks, according to data from Accenture, but only 14% of small businesses are ready to defend themselves. Considering that cybersecurity incidents cost businesses an average of $200,000 and that 60% of small businesses will go out of business within six months of an attack, cybersecurity should be a top-of-mind concern for small to mid-sized enterprises (SMEs). Email is an enormous attack vector for SMEs, and it is often the doorway to much more sophisticated […]

In the past, Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) performed very different roles. MSPs were responsible for an organization’s IT infrastructure (storage, desktop management, backups, network, etc.), and MSSPs focused on protecting the organization against cyber threats. However, as cybersecurity becomes of increasing concern for companies, the lines between MSPs and MSSPs have begun to blur. In addition to managing companies’ IT infrastructure, MSPs have begun pivoting to becoming MSSPs as well. However, the services that […]
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

As the cyber threat landscape evolves, cybercrime is becoming more professional, leading to more frequent and sophisticated attacks. All businesses are experiencing increased cyber risk – no one is excluded. Mergers and acquisitions can cause an even higher period of risk as cybercriminals take advantage of the confusion, disarray, and shift in processes that can reduce an organization’s ability to detect and respond to potential attacks. Since small businesses make up a significant portion of acquisitions, they are a common […]

Traditionally, cybersecurity fell under the jurisdiction of IT, tech, or product teams and was overseen by the CISO. While these teams are still the primary players in cybersecurity decisions, the risk landscape is expanding, causing many companies to shift their thinking when it comes to cyber risk and cybersecurity. Because potential cyberattacks pose a larger risk to a business, the entire leadership team and the board (if it exists) should become key stakeholders over a business’ security efforts. The person […]

Remember the good old days when ransomware wasn’t so rampant across industries and all types of companies, large and small? Us too. Unfortunately, the way in which hackers are using ransomware has changed significantly in the last several years, leaving every company vulnerable. So, many companies have turned to cyber insurance to protect their bottom line in the case of an attack. A recent SonicWall 2022 Cyber Threat Report claimed that governments around the world saw a 1,885% increase in […]


Any investment comes with an element of risk, and when you’re conducting due diligence on a potential startup or are working to mature a company in your portfolio, cybersecurity risk should be assessed and considered as early as possible. That’s because it can quickly spiral out of control and result in financial, reputational, continuity, legal, and compliance risk to the company and the investors In the past, cybersecurity might seem like something that could have been kicked down the line, […]




Cyberattacks have become a risk that all organizations need to address. As cybercrime has become more organized and professionalized, cyberattacks have also become more numerous, automated, and sophisticated. The reality is that any company can be the target of a cyberattack, and prevention is not enough to protect an organization. Even the most effective cyber solution will miss some attacks so organizations need to be prepared to address an attack at every stage of the kill chain (see diagram below). […]

We discuss what to consider before buying in. The cybersecurity market is complex, to say the least. The current market has over 3500 vendors with new ones being added daily. Coupled with the fact that the threat landscape keeps changing, it’s difficult for any security or risk leaders, especially those in SMEs, to know how to navigate this environment. Does a new threat or risk require a new tool, or does a current vendor have it covered? Vendors aren’t making […]

A majority of small and mid-sized enterprises (SME) have outstanding debt. It’s the cost of growing a business. But you might be surprised to know that your debt can extend far beyond the money owed to a lender. Many SMEs are also accumulating technical debt — the costs associated with reworking code, products, and solutions that have been improperly implemented to deliver a product more quickly. One of the more costly types of technical debt is cyber debt. Cyber debt […]

The world is watching the terrible conflict currently happening in Ukraine. Russia has attacked the nation in more ways than one, including leveraging cyberattacks as part of the escalating discord. SolCyber, and the information security sector as a whole is on high alert and we recommend organizations know what the elevated risk is and what they can expect from the conflict. CISA, The U.S. Cybersecurity & Infrastructure Security Agency, has issued a “Shields Up” warning to all businesses as a […]


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






