Cyber Security News and Podcasts from CYBER RANGES

The CYBER RANGES blog is a leading source of industry-led, expert, Cyber Security News, and Information about critical business and cybersecurity for companies, governments and professionals worldwide.

Podcasts, News and Event Updates

Name(Required)
What best describes your use case?(Required)
This field is for validation purposes and should be left unchanged.

No Excuses Hacked Companies Complain

CYBER RANGES FOR CYBERSECURITY VIGILANCE

CYBER RANGES by Silensec is proud to announce its Platinum Sponsorship of the MENA Information Security Conference 2021 hosted by VirtuPort. CYBER RANGES has joined other big names in the industry such as Blackberry, CISCO, Crowdstrike and Trend Micro.

Read More »
NEXT-GEN CYBER RANGES DELIVERING CUSTOMER-SPECIFIC REPEATABLE LARGE-SCALE REALISTIC EXERCISES

NEXT-GEN CYBER RANGES: DELIVERING CUSTOMER-SPECIFIC REPEATABLE LARGE-SCALE REALISTIC EXERCISES

Gartner has predicted the use of cyber ranges by large organizations to rise from 1% to 15% by 2022. Cyber ranging is an increasingly well appreciated way of boosting cyber dexterity, cyber posture and resilience for nations and organizations alike, since cyber ranging effectively addresses the 3 dimensions of cyber security: people, processes and technologies. This translates into the following number of macro use-cases:

Read More »
TECHNOLOGY FOR PERSONAL CYBER SECURITY

TECHNOLOGY FOR PERSONAL CYBER SECURITY

As a result of the global pandemic currently ongoing, we rely on technology more than ever to do our work and interact with friends and family. Social distancing practices have led to the increased time spent in our homes and therefore more time spent on the internet.

Read More »
CYBER SECURITY AWARENESS FOR ORGANIZATIONS AND BUSINESSES

CYBER SECURITY AWARENESS FOR ORGANIZATIONS AND BUSINESSES

The ever-changing cyber threat landscape implies that all businesses should have a functional cyber security awareness program in place. In spite of the increased spending on IT security, cyber-crimes are on the rise. A recent study by Verizon shows that phishing is still the most prevalent threat action in successful data breaches related to social engineering and malware attacks.

Read More »
IMPORTANCE OF SECURITY EDUCATION, TRAINING AND AWARENESS

IMPORTANCE OF SECURITY EDUCATION, TRAINING AND AWARENESS

Most security tools that are meant to improve the cybersecurity resilience of an organization are very underutilized as the personnel meant to operate them do not have sufficient expertise. Providing security training for employees equips them with the knowledge to efficiently use the tools and become better defenders of the organization.

Read More »
EMAIL SECURITY 101 DATA PROTECTION

EMAIL SECURITY 101 DATA PROTECTION

Despite the rise of collaboration tools such as Skype and Slack, email is still the most common tool for businesses to communicate and manage their day-to-day operations. However, email is one of the easiest ways for cyber-criminals to target organisations because of its easy access and risk of vulnerability from human error.

Read More »
HAT HACKERY AND THE COLOUR SPECTRUM

HAT HACKERY AND THE COLOUR SPECTRUM

Hacker, a word that seems to be appearing with greater frequency in the media for the last few years. A word that has been completely distorted by the media for the better part of the last thirty years. A word that has become almost synonymous with criminal, and which requires a qualifier in front of it to try and signify otherwise (“ethical” hacking), and still manages to leave some people unconvinced.

Read More »
MALWARE NEWS AND LATEST TRENDS ON INFOSECURITY

MALWARE NEWS AND LATEST TRENDS ON INFOSECURITY

The Valak malware loader is now remodelled to attack in stealth mode and is being used to steal personal data in a more sophisticated way. The creators of this malware are adopting the MaaS (malware as a service) model in collaboration with other threat actors. This new version of Valak 2.0 is known to steal sensitive information from Microsoft Exchange mail systems as well as credentials and domain certificates.

Read More »
Scroll to Top