The Forensics of Cyber Attacks – and the Power of Live-Fire Exercises
Delve into the critical world of digital forensics, and explore how forensic experts play a pivotal role in unraveling the mysteries behind cyber breaches. Learn about the indispensable collaboration between incident response and digital forensics, and how continuous learning and practical exercises can strengthen your cybersecurity defenses.
Analysis of a Water Treatment Plant Attack
Unlock essential insights from a recent cyberattack on a water treatment plant to enhance security for industrial control systems (ICS). Discover the vulnerabilities exploited in the attack, effective mitigations to secure critical infrastructure, and understand how the integration of IT and OT networks can both optimize operations and introduce risks.
Safeguarding Critical Infrastructure: Building Resilience Against Volt Typhoon and Cyber Threats
Delve into the state-sponsored threat actor, Volt Typhoon, exploring its evolution over time. Discover effective strategies for protecting critical infrastructure and fortifying cyber defenses against Volt Typhoon's tactics.
Creating Incident Response Playbooks: Why and How
Understand the need for incident response playbooks in cybersecurity, tips for better response playbooks, and how to build a incident response playbook step-by-step.
5 Ransomware Mistakes
Ransomware incidents have unique characteristics and challenges, and teams coming into cyber ranges for attack simulation exercises can make mistakes while practicing their response. Explore the five common mistakes observed in ransomware training sessions.
Cyber Reskilling: A Strategy to Reduce Cybersecurity Skills Gaps
Explore the concept of cyber reskilling and its effectiveness in addressing skills gaps within cybersecurity. Additionally, uncover best practices for reskilling individuals in the field of cybersecurity.
ICS/OT Security: Insights from NIST Guide
The integration of operational technology (OT) with IT systems, fueled by the Industrial Internet of Things (IIoT) and digital transformation, elevates vulnerability to cyber threats. Prioritizing OT cybersecurity through NIST Special Publication 800-82r3 strategies is crucial for safeguarding the reliability and safety of critical infrastructure.
Cloud Range Launches First Cyber Incident Commander Training
Cloud Range announces the launch of its new training program, Cybersecurity Incident Commander Training. Offered for a limited time at no cost, the training is tailored to those managing incidents in the security operations center (SOC).
With a Two-Year Revenue Growth of 411%, Cloud Range Ranked No. 44 on Inc. Magazine’s List of Fastest-Growing Private Companies in the Southeast Region
Cloud Range, the industry’s leading cyber range solution to reduce exposure to cyber risk across the organization, today announced that it has been ranked No. 44 on the fourth annual Inc. 5000 Regionals: Southeast list due to its 411% revenue growth over the last two years.
Cloud Range Recognized in the Late-2023 Gartner® Emerging Tech Report
Cloud Range is included in the Gartner Emerging Tech: Mitigate Advanced Persistent Threats in SaaS and Cloud Report as a Sample Provider of Cyber Ranges.
5 Crucial Techniques of Effective Incident Commanders
Get valuable insights into being an Incident Commander in cybersecurity, including essential skills and strategies for leading incident response teams. This blog provides an overview and some key takeaways from our recent webinar and panel discussion.
Cloud Range Ranked Best-in-Class in Datos Insights Cyber Range Matrix Report
Cloud Range announced that it has earned best-in-class recognition in Datos Insights Matrix: Cyber Range Solutions, an extensive analysis of cyber range solutions. The cyber range and live-fire simulation platform was evaluated for product features, vendor stability, client strength, and client service.
Ransomware Attacks Target Water Utilities
In recent events, Veolia North America and Southern Water, two prominent water companies, became targets of ransomware attacks. Reflecting on these incidents, Tom Marsland, VP of Technology at Cloud Range, shared his insights on the two cyber attacks.
Unleashing Cyber Resilience: A Telecom Giant's SOC Transformation
Explore the transformative journey of a global telecommunications enterprise as it reshapes its Security Operations Center (SOC) into a resilient defense against cyber threats. Dive into the tangible results achieved, reduced noise for leadership, boosted team culture, and enhanced proficiency, and unlock the full narrative of adaptability and cyber readiness in this compelling case study.
The Value of Human-Centric Cybersecurity
Gain insights into the importance of adopting a human-centric approach to cybersecurity and its impact on the capacity to thwart, identify, and address cyber threats. Explore the transformative potential of tailored training, security policies, and psychological elements in shaping your organization's security culture.
Tabletop 2.0™ — Next-Gen Incident Response Tabletop Exercises Show Whole Picture
Learn how Cloud Range's Tabletop 2.0 is transforming incident response and revolutionizing traditional exercises for a more immersive experience. Learn about the shortcomings of traditional exercises, 360-degree views with Tabletop 2.0, and the power of ongoing training.
Equipping OT Cybersecurity Frontlines With Training and Tech with Cloud Range CEO Debbie Gordon
Cloud Range CEO Debbie Gordon was recently a guest on the Velta Technology Industrial Cybersecurity Insider Podcast hosted by Craig Duckworth. They explored the importance of experiential learning in the realm of cybersecurity, addressing issues related to talent shortages and emphasizing the essential nature of ongoing, hands-on training.
NIST CSF 2.0 and Its Implications for Cybersecurity
Discover the NIST Cybersecurity Framework (CSF), renowned for providing a solid foundation, structure, and uniformity in cyber risk management. Uncover the changes and implications of cybersecurity surrounding the impending early 2024 release of NIST CSF 2.0.
Speeding Discovery of a Cyber Attack
The landscape of cyber attacks is evolving, increasing in complexity, frequency, and associated costs. Explore the most effective strategies for expediting cyber attack detection through a proficient SOC team, understand the efficacy of this approach, discover leading detection tools, and recognize the risks associated with delayed detection.
The Essential Role of the MITRE ATT&CK Framework in Effective SOC Training
Discover the MITRE ATT&CK Framework and explore ways to leverage it in SOC teams through the use of cyber ranges and simulation training.