
Measuring SOC Performance in the Cyber Range
Security operations managers struggle with obtaining meaningful metrics on their team’s performance, leaving them with no clear picture. Incident tracking tools can measure the average time from incident detection to resolution, or hours spent on addressing an incident. What these metrics cannot tell leadership is how well the team is trained and ready to execute on detection and response tasks.

How Does Cyber Range Training Make Life Easier for SOC Managers?
Cyber range training with Cloud Range includes aptitude testing, candidate assessments, skills development labs, and live-fire team simulation scenarios. Learn how that helps SOC managers overcome with the ongoing skills gap and measurably improve team performance.

State of Florida Selects Cloud Range for First-Ever Experiential Cybersecurity Simulation Training Across State
Cloud Range, the leading full-service cybersecurity readiness solution, announced that the State of Florida has selected its full-service cyber range and simulation training solutions to support Florida Digital Service’s (FL[DS]) enterprise cybersecurity initiative.

Cybersecurity Risk Remediation: A Non-Negotiable Expense in Times of Financial Crisis
In times of financial crisis, cutting back on cybersecurity may seem like a tempting option, but is it worth the risk? Discover how Cloud Range bolsters risk assessment by prioritizing your people - your tech stack's greatest asset. Empower your team with a robust risk remediation strategy.

How Does Cyber Range Training Optimize Hiring and Retention?
The cyber hiring process requires a significant investment of time and effort for SOC managers. Unfortunately, resumes, interviews, and certifications don’t tell the whole story about a given candidate. That’s why security leaders are increasingly using cyber ranges to improve the effectiveness of their hiring and evaluation process to build a skilled and knowledgeable team.

5 Critical Infrastructure Cyber Attacks and Key Lessons Learned from Them
Threat actors continue to target critical infrastructure in their cyber attacks. Cloud Range looks at 5 recent, high-profile critical infrastructure attacks, outlines key cybersecurity takeaways, and defines a measurable way to reduce IT and OT cyber risk.

How Does Cyber Range Training Prepare SOC Teams for the Next Attack?
You don’t want the first time your SOC team sees an attack to be when one is happening. That’s too late. It is valuable for your SOC team to train on attacks in a live-fire, simulated environment, so the team will be prepared to detect them and respond accordingly. Learn how cyber range training gets your team ready.

Industry Experts Analyze US National Cybersecurity Strategy - SecurityWeek Article
Cloud Range Founder & CEO Debbie Gordon was featured in a recent SecurityWeek article for her thoughts on the new national cybersecurity strategy. “While we applaud the administration’s goal to build out our national cyber workforce… it unfortunately doesn’t move the needle on what needs to be done to strengthen the workforce we have today.”

Empowering Students to Succeed in the Cybersecurity Job Market
Experiential learning (ExL) is critical in cybersecurity. Hands-on, live-fire cyber range and simulation exercises help students succeed in the classroom – and ultimately in their role as cybersecurity professionals.

What Is Cyber Range Training?
Cyber range training is an important component of the learning ecosystem for security operations center (SOC) practitioners and teams. This article kicks off a blog series from TAG Cyber. It explains the basic elements of cyber range training in the context of the commercial Cloud Range offering.

Navigating Your Zero Trust Journey to Stronger Cybersecurity
As cybersecurity vendors rush to deliver new solutions that promise to achieve zero trust, it’s vital to exercise caution around such claims. Learn how to navigate your organization’s zero trust journey and strengthen cybersecurity.

Training SOC Teams on OT-Related Cyber Threats
TAG Cyber said they were pleased to see the recent Cloud Range announcement about live-fire simulations for security operations center (SOC) teams to deal with advanced operational technology (OT) attacks.

Is Your Security Team Prepared for an OT Cyber Attack?
Get an overview of Cloud Range’s most-attended webinar that introduced the industry's only OT cyber range for live-fire training. The discussion – including a panel of OT security leaders – covered how to be ready for today’s threats that increasingly impact or directly target industrial control systems (ICS).

Cloud Range Launches the First OT/ICS Cyber Range for Live-Fire Training to Reduce Risk from Cyber Attacks on Critical Infrastructure
Cloud Range for Critical Infrastructure is the only full-service, live-fire, dynamic simulation training platform specifically developed for OT/ICS to safeguard industrial environments.

5 Ways to Combat the Cyber Workforce Shortage
Even while tech and other industries are going through layoffs, there is one industry that is still growing and desperately needs new hires – cybersecurity. It’s time to think outside the box when it comes to cyber hiring.

Training and Evaluating the Modern SOC
The modern detection and response analyst is faced with a variety of challenges. Adversaries are constantly developing and deploying new TTPs. Organizations must continually adapt their environment to meet business challenges, often introducing new security solutions for detecting and responding to an attack.

The Top Cybersecurity Trends For 2023
As we prepare for 2023, it’s important to think about what the year will bring in terms of cybersecurity. Here are some of the top trends to watch for in the next year – from Zero Trust to OT to cyber ranges.

What Is FlexLabs? Valuable Content For CISOs & Security Leaders
A Cybercrime Magazine podcast interview with Steve Morgan, Founder of Cybersecurity Ventures & Debbie Gordon, Founder & CEO of Cloud Range.

Industrial Control Systems (ICS): What Are They and How Do We Secure Them?
An industrial control system (ICS) refers to cyber-physical technologies that manage processes, such as manufacturing, production, and distribution. Like most networked devices, these cyber-physical systems require adequate security to protect them from malicious or negligent activity.

The Changing Role of Security Leaders – Valuable Q&As
Cloud Range had an excellent turnout for our latest webinar, The Changing Role of Security Leaders. We discussed how to accelerate new employees’ time to value, plan and track employees’ skill development, design learning plans, and more. We received some great questions during it and wanted to share the answers with everyone responsible for hiring, retaining, and managing cyber talent at their organizations.