Home
Blog
Breach Management

Breach Management articles

Insider Threats and How to Avoid Them

Insider Threats and How to Avoid Them

As the threat landscape continues to grow and shift and cyberattacks continue to rise, many companies are looking for new ways to defend themselves against bad actors, nation-states, and competitors trying to hack their systems and steal intellectual property. One major threat organizations may not be on top of is the one that lurks within their company — insider threats. It’s estimated that 60% of data breaches are caused by insider threats, and a study by the Ponemon Institute found […]

Avatar photo
Hwei Oh
Is Your Organization Ready for Managed Security?

Is Your Organization Ready for Managed Security?

Investing in effective cybersecurity is no longer a luxury but a critical necessity for businesses of all sizes. Smaller organizations are especially vulnerable because hackers rely on the fact that SMEs have a smaller cybersecurity budget than larger organizations. This is borne out by the fact that 43% of all cyber attacks are launched against small/mid-size businesses. Reasons your organization needs managed security Cyber threats have grown both in quantity and complexity. Research by Check Point showed a 38% increase […]

Avatar photo
Hwei Oh
Prioritizing Cybersecurity in Manufacturing

Prioritizing Cybersecurity in Manufacturing

Cybersecurity in the manufacturing industry is not a new topic, but it is an increasingly important one. Like many other industries, manufacturing is rapidly adopting new technology, which is widening the threat landscape, leading to new cyber risks. Unlike other industries, most of this new technology falls under the umbrella of operational technology (OT) rather than information technology (IT). OT is a combination of hardware and software that manages industrial operations. It includes (among other things) industrial control systems (ICS) […]

Avatar photo
Hwei Oh
Navigating Cybersecurity for Online Sports Betting Companies

Navigating Cybersecurity for Online Sports Betting Companies

Thanks to the 2018 Murphy v. NCAA Supreme Court case, sports betting and gambling are legal in 34 states and Washington, D.C. This historic case opened the doors for online sports betting, which has risen dramatically in recent years. New platforms and games are entering the market daily, and research from Data Bridge Market shows that the online sports betting market is expected to reach USD 167.66 billion by 2029. As the industry booms and more and more bets are being placed […]

Avatar photo
Hwei Oh
The Crucial Role of Cybersecurity in Financial Services

The Crucial Role of Cybersecurity in Financial Services

The finance industry is one of the most targeted industries for cyberattacks, and it makes sense. When most cyberattacks are conducted for financial gain, bad actors would naturally be inclined to go directly where the money is. However, the mass disruption caused by digitization and FinTech has created recent shifts in the industry making them particularly vulnerable. As the finance world becomes more digitized and financial institutions become increasingly interconnected, banking and financial services have become more efficient and inclusive […]

Avatar photo
Hwei Oh
Evolving cyber threats in 2023

Evolving cyber threats in 2023

To stay competitive and relevant in business, we have to understand how to move at the pace of technology. We see this on both the consumer and business sides – expectations evolve alongside emerging trends, such as AI and machine learning. The same is true for cybercriminals. They also move at the pace of technology, and they’re counting on businesses to be behind the curve. While many attacks are known, such as phishing, business email compromise (BEC), and ransomware, tactics […]

Avatar photo
Charles Ho
Why the Legal Industry Needs to Pay Attention to Cybersecurity

Why the Legal Industry Needs to Pay Attention to Cybersecurity

Cyberattacks across all industries are on the rise, but the numbers are particularly troubling for the legal industry. According to American Bar Association’s 2022 Legal Technology Survey Report, 27% of respondents claimed to have experienced a security breach – up from 25% the year before. An additional 25% reported not knowing if their firm had experienced a security breach. A 2021 report released by security firm BlueVoyant found that while 15% of thousands of law firms showed signs of compromised networks, […]

Avatar photo
Hwei Oh
How to Manage Breach Reporting as Part of an IR Strategy

How to Manage Breach Reporting as Part of an IR Strategy

In December 2022, FBI Supervisory Special Agent Michael Sohn cautioned small businesses that they were being targeted by cybercriminals. While larger corporations are investing more in hardening their security posture, the relative weakness of smaller businesses makes them prime targets for hackers. However, no matter how much cybersecurity a company has in place, no one can guarantee that its network will never be breached. That’s why a comprehensive risk strategy for cybersecurity includes cyber insurance and incident response to mitigate […]

Avatar photo
Hwei Oh
Preparing for SEC Recommendations

Preparing for SEC Recommendations

Update Aug 16, 2023: On July 26th, the SEC officially released newly adopted rules on disclosing any data breaches and cyber incidents for any company under SEC jurisdiction and regulation, including foreign private issuers. The rules require disclosure of any cyber incident four days after the registrant (the affected entity) finds the incident to be a material incident, meaning it can affect shareholders and investors. Registrants will also have to detail any processes that pertain to “assessing, identifying, and managing material risks from cybersecurity […]

Avatar photo
Charles Ho
DNS threat protection with DNSFilter and SolCyber

DNS threat protection with DNSFilter and SolCyber

As part of our partnership launch with DNSFilter, we talk to Dave Raphael, COO at DNSFilter and David Emerson, CTO at SolCyber about the impact of network security for the modern business and why DNSFilter was a clear partner of choice for SolCyber and an integral part of our Foundational Coverage service. Provide us with an overview on what DNSFilter | SolCyber does? Dave: At DNSFilter, we provide protective DNS at the recursive DNS level to mitigate threats in real-time. […]

Avatar photo
Hwei Oh
How the energy and renewables sector can protect against cyberattacks

How the energy and renewables sector can protect against cyberattacks

Cyberattacks are one of the biggest threats facing businesses today, and the energy and renewables sector is not exempt. In fact, energy companies frequently make the list of the top 10 industries targeted by attackers. As the industry undergoes massive change, it’s entirely possible that energy companies become an even more enticing target. There are several reasons the industry is so vulnerable, but chief among them is the large attack surface. Vulnerabilities exist not just in power plants, but in […]

Avatar photo
Hwei Oh
Practical vulnerability management for SMEs

Practical vulnerability management for SMEs

As SMEs look to find new ways of being cost-effective, efficient, and reaching broader audiences, they often turn to digitalization. While an expanding digital environment presents more growth opportunities for businesses, it also creates problems for leaders who are looking to manage and maintain risk. This often emerges in the form of an increased attack surface and a rise in common vulnerabilities and high risk vulnerabilities. This can result in potential threats reaching your network, becoming a major business risk […]

Avatar photo
Charles Ho
The Pitfalls of Not Having an Incident Response (IR) Retainer

The Pitfalls of Not Having an Incident Response (IR) Retainer

The wrong time to look for flood insurance is during a flood. Similarly, the wrong time to look for an Incident Response (IR) team is when you’re already under a cyberattack. We get it. Inflation is skyrocketing, and businesses are tightening their purse strings. The rise in energy and gas prices also isn’t helping. Companies need cash flow, and hiring another vendor on retainer might seem counterintuitive while the world is still recovering following the pandemic. But inflation and gas […]

Avatar photo
Hwei Oh
The cybersecurity implications of AI

The cybersecurity implications of AI

AI went mainstream almost overnight. The technology has already changed how we live, work, and interact with each other. The use cases for AI are practically endless. Here are some of the things people are doing with AI: Unfortunately, the nascent technology has already shown several weaknesses, potentially opening the door to unforeseen types of hacks. Cybercriminals are already finding ways to use AI to their advantage, the consequences of which can be devastating. Criminals can use new technology just […]

Avatar photo
Charles Ho

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

©
2026
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber DPM++

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

5544