Cyber Security News and Podcasts from CYBER RANGES

The CYBER RANGES blog is a leading source of industry-led, expert, Cyber Security News, and Information about critical business and cybersecurity for companies, governments and professionals worldwide.

Podcasts, News and Event Updates

Name
Select to Receive News and Updates(Required)
This field is for validation purposes and should be left unchanged.

Upcoming Instructor-Led Events

entry level cybersecurity jobs

9 ENTRY-LEVEL JOBS IN CYBERSECURITY IN 2020

There is a shortage of qualified workers in cybersecurity, and the vacancies are expected to rise. Statistics show that there may be up to 3.5 million cybersecurity job vacancies by 2021. This figure is scary because other statistics estimate that cybercrimes will cost the world $6 trillion by 2021. This is an industry that is growing at a higher rate than most other industries.

Read More »
Attack Simulations In Next-gen CyberRanges 2021

ATTACK SIMULATIONS IN NEXT-GEN CYBER RANGES

As the threat intelligence landscape grows and evolves, so does the need for tools that help us defend against evolving threats. Tools alone, mind you, will not be sufficient enough for us to defend our assets and keep our organizations operational.

Read More »
1st African Cyber Security Drill 2021

CYBER RANGES BY SILENSEC SUPPORTS THE 1ST AFRICAN CYBER DRILL

Cyprus, 28 June 2021 – AfricaCERT is organizing the 1st African Cyber Drill for National CERTs/CSIRTs/CIRTs, IXPs & RENs in Africa and OIC CERTs/CSIRTs on 30th June – 1st July 2021 in collaboration with the Computer Emergency Response Team of Mauritius (CERT-MU, a division of the National Computer Board, Mauritius).

Read More »
Code Injection

WHAT IS CODE INJECTION AND HOW YOU CAN AVOID IT

Code Injection vulnerabilities is a general term that describes vulnerabilities that can be exploited by an attacker to inject and execute malicious code. This vulnerability occurs usually due to the lack of untrusted data validation. Applications which directly evaluate code without validating it first would be vulnerable

Read More »
Scroll to Top