Addressing the Skills Gap through Cyber Range Training
Cyber Range Training Gina Gallup Cyber Range Training Gina Gallup

Addressing the Skills Gap through Cyber Range Training

Discover how cyber range training can be your organization's secret weapon against the growing cybersecurity skills gap. This blog dives into the causes and impacts of the talent shortage, showcasing how immersive, hands-on simulations prepare your team to handle real threats, reduce recovery time, and build resilience across your security operations.

Read More
Beware of Cyber Ghouls: How to Keep Your Organization Safe from Digital Nightmares
Cyber Training Gina Gallup Cyber Training Gina Gallup

Beware of Cyber Ghouls: How to Keep Your Organization Safe from Digital Nightmares

This October, as Halloween approaches, don't let cyber ghouls like ransomware and phishing scams haunt your organization. Stay vigilant during Cybersecurity Awareness Month by using training, simulations, and strong defenses to fend off digital nightmares. Equip your team to handle threats with confidence, and keep your data safe from lurking cyber monsters.

Read More
Simulating Real-World Attacks: How Cyber Ranges Strengthen Incident Response in State Government Agencies

Simulating Real-World Attacks: How Cyber Ranges Strengthen Incident Response in State Government Agencies

Cyber ranges offer state government agencies realistic simulations of cyberattacks, helping them improve incident response, enhance team coordination, and build resilience. These tailored exercises prepare agencies for real-world threats, ensuring better preparedness and compliance with regulations while reducing recovery costs.

Read More
Cloud Range Partners with National Guard of Nebraska to Strengthen Cyber Capacity and Resilience of Nation’s Critical Infrastructure

Cloud Range Partners with National Guard of Nebraska to Strengthen Cyber Capacity and Resilience of Nation’s Critical Infrastructure

Cloud Range was honored to partner with the Nebraska National Guard and to provide our Virtual Threat Environment (VTE) and a series of live-fire attack simulation exercises for "Cyber Tatanka," the annual two-week event where 194 civilian and military cybersecurity professionals got hands-on experience defending against cyber attacks in a controlled environment.

Read More
Addressing 5 Concerns with Cyber Security Degrees: How Can Higher Education Help Prepare Cybersecurity Students?
Cloud Range EDU Cloud Range Cloud Range EDU Cloud Range

Addressing 5 Concerns with Cyber Security Degrees: How Can Higher Education Help Prepare Cybersecurity Students?

Cybersecurity degrees often lack real-world application, focusing more on theoretical knowledge than practical skills. Higher education can help by updating curricula, incorporating hands-on training, and utilizing cyber ranges. By addressing these gaps, students will be better prepared for the evolving job market. Continuous, experiential learning ensures graduates have the relevant skills employers seek in cybersecurity professionals.

Read More
Takeaways from Palo Alto Unit 42's Incident Response Report 2024
Industry News Cloud Range Industry News Cloud Range

Takeaways from Palo Alto Unit 42's Incident Response Report 2024

Palo Alto's 2024 Incident Response Report offers crucial insights into evolving cybersecurity threats. Key takeaways include improved incident detection, with organizations identifying 80% of incidents internally and reducing threat actor dwell time to 13 days. The report highlights a shift from phishing to internet-facing vulnerabilities, emphasizing the need for secure coding practices and effective patch management.

Read More
Combating Election Cybersecurity Threats
Public Sector Security Cloud Range Public Sector Security Cloud Range

Combating Election Cybersecurity Threats

Protecting election integrity is crucial in today’s digital age. Key threats include social engineering attacks targeting election officials, DDoS attacks disrupting voter registration systems, and AI-generated disinformation influencing voters. To counter these threats, implement an election-specific incident response plan, share threat intelligence, ensure system redundancy, conduct independent audits, and engage in realistic cybersecurity training.

Read More
Cloud Range Selected as 2024 SC Awards Finalist for Best IT Security-Related Training Program
Cloud Range News Cloud Range Cloud Range News Cloud Range

Cloud Range Selected as 2024 SC Awards Finalist for Best IT Security-Related Training Program

Cloud Range Named 2024 SC Awards Finalist

August 30, 2024 – Cloud Range is honored as a finalist for the 2024 SC Awards in the Best IT Security-Related Training Program category. This recognition celebrates Cloud Range's commitment to innovative, hands-on cybersecurity training. The winners will be announced on September 17, 2024.

Read More
5 Steps for Improving TTX: How to Create Tabletop Exercises That Are Actionable and Effective
Tabletop Exercises Cloud Range Tabletop Exercises Cloud Range

5 Steps for Improving TTX: How to Create Tabletop Exercises That Are Actionable and Effective

To create actionable and effective tabletop exercises (TTX), organizations should focus on five key steps: simplify planning by defining clear objectives and using templates, integrate AI for scenario generation and automation, address compliance by aligning with regulatory standards, measure impact with defined metrics and post-exercise reviews, and ensure continuous improvement through regular updates and a learning culture.

Read More
Analyzing The 2024 Ticketmaster Breach
Industry News Cloud Range Industry News Cloud Range

Analyzing The 2024 Ticketmaster Breach

On May 28th, a filing to the Securities and Exchange Commission (SEC) by parent company LiveNation described launching an investigation with industry-leading forensic investigators to understand what happened. This quick action was a positive step after discovering the breach. The data breach notification suggests it took Ticketmaster 51 days to discover they’d been breached.

Read More
Using Live-Fire Simulations to Improve ICS/OT Threat Protection
OT Security Cloud Range OT Security Cloud Range

Using Live-Fire Simulations to Improve ICS/OT Threat Protection

Dr. Edward Amoroso of TAG Infosphere highlights the critical role of live-fire simulations in bolstering ICS/OT threat protection. Cloud Range's virtual cyber range enables IR teams to practice responding to diverse attack scenarios safely and collaboratively. This training not only enhances technical skills but also creates effective teamwork in safeguarding critical infrastructure.

Read More
Leading from the Frontlines: Developing Strong Incident Commanders
Cyber Training Cloud Range Cyber Training Cloud Range

Leading from the Frontlines: Developing Strong Incident Commanders

The cybersecurity incident commander plays an important role in managing cyber incidents effectively. Beyond technical expertise, they must understand their team’s skills and personalities to orchestrate a cohesive response. From assessing the attack’s scope to directing actions and team communication, their strategic oversight ensures efficient incident resolution and preventive measures.

Read More
Emerging Trends in Cyber Offense and Defense for ICS/OT Systems
OT Security Debbie Gordon OT Security Debbie Gordon

Emerging Trends in Cyber Offense and Defense for ICS/OT Systems

The ICS/OT landscape is transforming to modern deployments emphasizing zero trust and external resource coordination. This evolution is driven by increased connectivity and frequent attacks. Offensive trends include supply chain attacks, advanced persistent threats, ransomware, and operational data manipulation.

Defensive measures focus on cyber range training, zero trust architecture, threat intelligence sharing, and AI/ML integration to enhance cybersecurity resilience.

Read More
Generative AI Hacking Tools and What They Mean for Defenders
Cyber Skills Development Gina Gallup Cyber Skills Development Gina Gallup

Generative AI Hacking Tools and What They Mean for Defenders

Generative AI is transforming cybersecurity, providing defensive benefits and new hacking tools for threat actors. This blog explores GenAI tools like WormGPT, FraudGPT, and XXXGPT, which enable sophisticated attacks. Enhancing email verification, account security, dark web intel, and practicing in simulated environments are essential for robust cybersecurity against these emerging threats.

Read More