
Tales from the SOC: Classic Crypto – Operation GUNMAN | S1 Ep023
Cold War cryptographic capers in a real-world Spy vs. Spy scenario!
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

It’s no surprise that data breaches and cyberattacks are on the rise. The Identity Theft Resource Center issued a press release in October of 2021 saying that the number of data breaches that had occurred in 2021 through September had already surpassed the number of attacks in all of 2020 — a year in which small businesses saw a 424% increase in cyberattacks. What’s worse is that adversaries don’t discriminate and they’re using the same tactics against businesses big and small. […]

We spoke to Brian Stuckey, a cybersecurity and risk management expert, investor, and co-founder who provided helpful insight and expertise for this article. For many startup founders and cofounders, the process of raising money from investors and other VCs brings a few different challenges. Potential investors are looking for financially sound companies with a hyper growth potential, the right leaders, and a vision they can trust in. This puts a tremendous amount of pressure on company leaders to ensure their […]


Cyber debt can be incredibly detrimental to a young or growing company and it’s all too easy to accrue. Businesses often fail to set up the proper security measures early on because they are deemed too expensive or time consuming. As people, technology, and devices are added to a business’s ecosystem, they are protected on a one-off basis — or not at all — leaving gaps bad actors can exploit. And because these businesses lack a security strategy, they’re also […]

2021 was a tumultuous year for cybersecurity and, unfortunately, we saw the effects of successful cybersecurity attacks across major companies and industries. The trends we observed in 2020 largely continued in 2021. Ransomware attacks continued to increase and a few major hacks dominated news media around the world. The Colonial Pipeline attack showed how devastating these ransomware attacks could be, and the immediate impact to supply chains and municipal infrastructures. The aftermath of 2020’s SolarWinds hack was also at the […]

We spoke to Brian Stuckey, a cybersecurity and risk management expert, investor, and co-founder who provided helpful insight and expertise for this article. Starting any new business is difficult and startups who are looking to be the next unicorn or IPO face many challenges as they try to grow, scale their services, and increase their customer base as quickly as possible. These startups will undergo rigorous due diligence from investors that are considering putting money behind their company. This is […]

We’re thrilled to have a guest blog contributed by one of our technology partners, Right-Hand Cybersecurity. Right-Hand is a group of mission-oriented individuals driven to shift the power away from the adversary and back into the hands of businesses. Enjoy the article! You may relate internet attacks with large organizations. However, cybercriminal activity affects businesses of all sizes. Small and medium-sized enterprises (SMEs) are no exceptions. On top of that, every one in five SMEs becomes a cyber victim, and […]

Security and company leaders have a difficult challenge when it comes to securing their organization and properly managing their risk. Here’s just a sampling of their challenges and what they face: The complexity is compounded for smaller companies who have to allocate resources sparingly. What options do they have and how can they prioritize actions that will make them more secure? We’ve put together a list of 5 cybersecurity must haves for any organization, regardless of their size or industry. This […]

As cybersecurity demands increase, the available pool of talent is not keeping up with the pace. And over the last few years, the already profound talent gap has continued to expand. According to the latest (ISC)² Cybersecurity Workforce Study, there are 2.7 million unfilled infosec positions worldwide. And it’s estimated that the cybersecurity workforce needs to grow 65 percent to meet global demand. Given that cyberattacks are becoming more frequent and sophisticated, now isn’t an ideal time to be playing […]

There’s a new vulnerability making waves across the cybersecurity industry and the business media at large. It’s called log4j, it’s a zero-day exploit, remote code execution vulnerability, and is found within a number of various third-party vendors, infrastructure providers, and SaaS companies. Because these companies are major third-party providers, the number of companies, sites, and services impacted are wide. A zero-day exploit or vulnerability refers to the fact that the vulnerability is unpatched and is often discovered by hackers first, […]

The holiday shopping season is well underway and it’s often one of the busiest for retailers, eCommerce companies, and others who seek to use the holiday as an opportunity to offer discounted prices on their most popular products. Online shopping reached $8.9B on Black Friday and $10.7B on Cyber Monday and Google estimates that, on average, websites can see a traffic increase of 300% during the holiday shopping season. However, this period can also be a holiday for hackers who […]

We are excited to announce that SolCyber made CRN’s list of The 10 Hottest Cybersecurity Startups of 2021. CRN is a leading technology news and information source for solution providers, IT channel partners and value-added resellers (VARs). In the round-up, we were praised for our curated tech stack, streamlined security tools and services, affordable coverage, and our work to reduce cyber risk, inefficiencies and complexity. About the CRN List In assembling their list of the 10 hottest cybersecurity startups of […]


Much to the chagrin of security professionals, cybersecurity best practices are often seen as a nuisance by employees outside of the security and IT teams. The consensus is that security slows down processes, and limits autonomy and training is one more thing to check off the list. But employees are ultimately your biggest vulnerability, so in order to move the needle and actually improve your security posture, you need participation from all teams. IT needs to patch software, employees must […]

Managing cybersecurity vendors wasn’t the daunting task it is these days. Not too long ago, organizations were bound by a perimeter, and it was simpler to piece together a set of capabilities to stay safe and secure. Businesses of all sizes followed a surefire formula that kept most of them safe. With the introduction of the cloud and the push for digital transformation, everything changed. The perimeter has largely evaporated — companies rarely own their servers and entire teams are […]

Endpoint security looks quite a bit different than it did several years ago. Organizations these days are much more disparate and disconnected. In many ways, the perimeter has dissolved and organizations have less control over what aspects of their environment they can secure. This results in endpoints becoming the most important element for an organization’s cybersecurity. We advocate implementing an EPP solution for all your endpoints. It can help secure your organization and provide a critical mass of telemetry that […]

It’s no surprise that data breaches and cyberattacks are on the rise. The Identity Theft Resource Center issued a press release in October of 2021 saying that the number of data breaches that had occurred in 2021 through September had already surpassed the number of attacks in all of 2020 — a year in which small businesses saw a 424% increase in cyberattacks. What’s worse is that adversaries don’t discriminate and they’re using the same tactics against businesses big and small. […]

We spoke to Brian Stuckey, a cybersecurity and risk management expert, investor, and co-founder who provided helpful insight and expertise for this article. For many startup founders and cofounders, the process of raising money from investors and other VCs brings a few different challenges. Potential investors are looking for financially sound companies with a hyper growth potential, the right leaders, and a vision they can trust in. This puts a tremendous amount of pressure on company leaders to ensure their […]

Cyber debt can be incredibly detrimental to a young or growing company and it’s all too easy to accrue. Businesses often fail to set up the proper security measures early on because they are deemed too expensive or time consuming. As people, technology, and devices are added to a business’s ecosystem, they are protected on a one-off basis — or not at all — leaving gaps bad actors can exploit. And because these businesses lack a security strategy, they’re also […]
By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

2021 was a tumultuous year for cybersecurity and, unfortunately, we saw the effects of successful cybersecurity attacks across major companies and industries. The trends we observed in 2020 largely continued in 2021. Ransomware attacks continued to increase and a few major hacks dominated news media around the world. The Colonial Pipeline attack showed how devastating these ransomware attacks could be, and the immediate impact to supply chains and municipal infrastructures. The aftermath of 2020’s SolarWinds hack was also at the […]

We spoke to Brian Stuckey, a cybersecurity and risk management expert, investor, and co-founder who provided helpful insight and expertise for this article. Starting any new business is difficult and startups who are looking to be the next unicorn or IPO face many challenges as they try to grow, scale their services, and increase their customer base as quickly as possible. These startups will undergo rigorous due diligence from investors that are considering putting money behind their company. This is […]

We’re thrilled to have a guest blog contributed by one of our technology partners, Right-Hand Cybersecurity. Right-Hand is a group of mission-oriented individuals driven to shift the power away from the adversary and back into the hands of businesses. Enjoy the article! You may relate internet attacks with large organizations. However, cybercriminal activity affects businesses of all sizes. Small and medium-sized enterprises (SMEs) are no exceptions. On top of that, every one in five SMEs becomes a cyber victim, and […]


Security and company leaders have a difficult challenge when it comes to securing their organization and properly managing their risk. Here’s just a sampling of their challenges and what they face: The complexity is compounded for smaller companies who have to allocate resources sparingly. What options do they have and how can they prioritize actions that will make them more secure? We’ve put together a list of 5 cybersecurity must haves for any organization, regardless of their size or industry. This […]




We are excited to announce that SolCyber made CRN’s list of The 10 Hottest Cybersecurity Startups of 2021. CRN is a leading technology news and information source for solution providers, IT channel partners and value-added resellers (VARs). In the round-up, we were praised for our curated tech stack, streamlined security tools and services, affordable coverage, and our work to reduce cyber risk, inefficiencies and complexity. About the CRN List In assembling their list of the 10 hottest cybersecurity startups of […]

Much to the chagrin of security professionals, cybersecurity best practices are often seen as a nuisance by employees outside of the security and IT teams. The consensus is that security slows down processes, and limits autonomy and training is one more thing to check off the list. But employees are ultimately your biggest vulnerability, so in order to move the needle and actually improve your security posture, you need participation from all teams. IT needs to patch software, employees must […]

Managing cybersecurity vendors wasn’t the daunting task it is these days. Not too long ago, organizations were bound by a perimeter, and it was simpler to piece together a set of capabilities to stay safe and secure. Businesses of all sizes followed a surefire formula that kept most of them safe. With the introduction of the cloud and the push for digital transformation, everything changed. The perimeter has largely evaporated — companies rarely own their servers and entire teams are […]

Endpoint security looks quite a bit different than it did several years ago. Organizations these days are much more disparate and disconnected. In many ways, the perimeter has dissolved and organizations have less control over what aspects of their environment they can secure. This results in endpoints becoming the most important element for an organization’s cybersecurity. We advocate implementing an EPP solution for all your endpoints. It can help secure your organization and provide a critical mass of telemetry that […]


By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.






