Combating Election Cybersecurity Threats
Public Sector Security Cloud Range Public Sector Security Cloud Range

Combating Election Cybersecurity Threats

Protecting election integrity is crucial in today’s digital age. Key threats include social engineering attacks targeting election officials, DDoS attacks disrupting voter registration systems, and AI-generated disinformation influencing voters. To counter these threats, implement an election-specific incident response plan, share threat intelligence, ensure system redundancy, conduct independent audits, and engage in realistic cybersecurity training.

Read More
Cloud Range Selected as 2024 SC Awards Finalist for Best IT Security-Related Training Program
Cloud Range News Cloud Range Cloud Range News Cloud Range

Cloud Range Selected as 2024 SC Awards Finalist for Best IT Security-Related Training Program

Cloud Range Named 2024 SC Awards Finalist

August 30, 2024 – Cloud Range is honored as a finalist for the 2024 SC Awards in the Best IT Security-Related Training Program category. This recognition celebrates Cloud Range's commitment to innovative, hands-on cybersecurity training. The winners will be announced on September 17, 2024.

Read More
5 Steps for Improving TTX: How to Create Tabletop Exercises That Are Actionable and Effective

5 Steps for Improving TTX: How to Create Tabletop Exercises That Are Actionable and Effective

To create actionable and effective tabletop exercises (TTX), organizations should focus on five key steps: simplify planning by defining clear objectives and using templates, integrate AI for scenario generation and automation, address compliance by aligning with regulatory standards, measure impact with defined metrics and post-exercise reviews, and ensure continuous improvement through regular updates and a learning culture.

Read More
Analyzing The 2024 Ticketmaster Breach
Industry News Cloud Range Industry News Cloud Range

Analyzing The 2024 Ticketmaster Breach

On May 28th, a filing to the Securities and Exchange Commission (SEC) by parent company LiveNation described launching an investigation with industry-leading forensic investigators to understand what happened. This quick action was a positive step after discovering the breach. The data breach notification suggests it took Ticketmaster 51 days to discover they’d been breached.

Read More
Using Live-Fire Simulations to Improve ICS/OT Threat Protection
OT Security Cloud Range OT Security Cloud Range

Using Live-Fire Simulations to Improve ICS/OT Threat Protection

Dr. Edward Amoroso of TAG Infosphere highlights the critical role of live-fire simulations in bolstering ICS/OT threat protection. Cloud Range's virtual cyber range enables IR teams to practice responding to diverse attack scenarios safely and collaboratively. This training not only enhances technical skills but also creates effective teamwork in safeguarding critical infrastructure.

Read More
Leading from the Frontlines: Developing Strong Incident Commanders
Cyber Training Cloud Range Cyber Training Cloud Range

Leading from the Frontlines: Developing Strong Incident Commanders

The cybersecurity incident commander plays an important role in managing cyber incidents effectively. Beyond technical expertise, they must understand their team’s skills and personalities to orchestrate a cohesive response. From assessing the attack’s scope to directing actions and team communication, their strategic oversight ensures efficient incident resolution and preventive measures.

Read More
Emerging Trends in Cyber Offense and Defense for ICS/OT Systems
OT Security Debbie Gordon OT Security Debbie Gordon

Emerging Trends in Cyber Offense and Defense for ICS/OT Systems

The ICS/OT landscape is transforming to modern deployments emphasizing zero trust and external resource coordination. This evolution is driven by increased connectivity and frequent attacks. Offensive trends include supply chain attacks, advanced persistent threats, ransomware, and operational data manipulation.

Defensive measures focus on cyber range training, zero trust architecture, threat intelligence sharing, and AI/ML integration to enhance cybersecurity resilience.

Read More
Generative AI Hacking Tools and What They Mean for Defenders
Cyber Skills Development Gina Gallup Cyber Skills Development Gina Gallup

Generative AI Hacking Tools and What They Mean for Defenders

Generative AI is transforming cybersecurity, providing defensive benefits and new hacking tools for threat actors. This blog explores GenAI tools like WormGPT, FraudGPT, and XXXGPT, which enable sophisticated attacks. Enhancing email verification, account security, dark web intel, and practicing in simulated environments are essential for robust cybersecurity against these emerging threats.

Read More
Unifying IT and ICS/OT Security Ecosystems
OT Security Gina Gallup OT Security Gina Gallup

Unifying IT and ICS/OT Security Ecosystems

Navigating the merger of IT and operational technology (OT) security, especially in energy and utilities, demands strategic alignment and joint planning. Cybersecurity strategies must balance IT's data focus with OT's safety priorities, respecting their operational differences and cultural nuances. This integration is crucial for safeguarding against evolving threats in unified IT and ICS/OT security.

Read More
The Pivotal Role of Live Incident Response Rehearsal in Cyber Resilience
Cyber Training Cloud Range Cyber Training Cloud Range

The Pivotal Role of Live Incident Response Rehearsal in Cyber Resilience

In today's threat landscape, complete incident prevention is unrealistic. Effective cyber resilience balances prevention with detection and response. Live incident response rehearsals are essential, providing hands-on experience to prepare teams for real-world attacks. Gartner research highlights the importance of recovery, advocating for regular rehearsals to build technical and psychological resilience.

Read More
Shaping the SOC of Tomorrow: Insights from Debbie Gordon on CISO Tradecraft Podcast
In the News Cloud Range In the News Cloud Range

Shaping the SOC of Tomorrow: Insights from Debbie Gordon on CISO Tradecraft Podcast

In the podcast episode of CISO Tradecraft, Debbie Gordon shares key insights on building effective Security Operations Centers (SOCs). From hiring skilled personnel to proactive training, Gordon emphasizes the importance of staying ahead in cybersecurity. The discussion covers adapting to regulations, the future of training, and leveraging Cloud Range's solutions for live cyber-attack simulations.

Read More
Cloud Range Wins 2024 Cybersecurity Excellence Award for Best Security Education Platform
Cloud Range News Gina Gallup Cloud Range News Gina Gallup

Cloud Range Wins 2024 Cybersecurity Excellence Award for Best Security Education Platform

Cloud Range is honored to have won the 2024 Cybersecurity Excellence Award for Best Security Education Platform. Cloud Range’s Cyber Range and Simulation Platform measurably decreases exposure to cyber risk and overcomes the staggering cyber skills gap by helping cybersecurity teams prepare to defend against complex attacks and reduce the time to detect and remediate cyber incidents.

Read More
Non-Technical Skills That Help SOCs Thrive
Cyber Training Gina Gallup Cyber Training Gina Gallup

Non-Technical Skills That Help SOCs Thrive

Explore the crucial non-technical skills necessary for SOC success. The human element plays significant role alongside technical skills. The blog discusses a range of soft skills including stress management, problem-solving, situational awareness, clear communication, empathy, attention to detail, and teamwork. These skills enhance the ability to handle cyber threats effectively and maintain operational efficiency.

Read More