Cyber Security News and Podcasts from CYBER RANGES

The CYBER RANGES blog is a leading source of industry-led, expert, Cyber Security News, and Information about critical business and cybersecurity for companies, governments and professionals worldwide.

Podcasts, News and Event Updates

Name(Required)
What best describes your use case?(Required)
This field is for validation purposes and should be left unchanged.

Code Injection

WHAT IS CODE INJECTION AND HOW YOU CAN AVOID IT

Code Injection vulnerabilities is a general term that describes vulnerabilities that can be exploited by an attacker to inject and execute malicious code. This vulnerability occurs usually due to the lack of untrusted data validation. Applications which directly evaluate code without validating it first would be vulnerable

Read More »
Live Fire Incident Response And Threat Hunting Training

LIVE-FIRE INCIDENT RESPONSE AND THREAT HUNTING

Incident response teams and SOC analysts need to keep their knowledge and skills up to date with regard to the most relevant and current threats, in order to improve incident handling, teamwork, compliance skills, workflows, run-book usage, and other operational skills.

Read More »
No Excuses Hacked Companies Complain

CYBER RANGES FOR CYBERSECURITY VIGILANCE

CYBER RANGES by Silensec is proud to announce its Platinum Sponsorship of the MENA Information Security Conference 2021 hosted by VirtuPort. CYBER RANGES has joined other big names in the industry such as Blackberry, CISCO, Crowdstrike and Trend Micro.

Read More »
NEXT-GEN CYBER RANGES DELIVERING CUSTOMER-SPECIFIC REPEATABLE LARGE-SCALE REALISTIC EXERCISES

NEXT-GEN CYBER RANGES: DELIVERING CUSTOMER-SPECIFIC REPEATABLE LARGE-SCALE REALISTIC EXERCISES

Gartner has predicted the use of cyber ranges by large organizations to rise from 1% to 15% by 2022. Cyber ranging is an increasingly well appreciated way of boosting cyber dexterity, cyber posture and resilience for nations and organizations alike, since cyber ranging effectively addresses the 3 dimensions of cyber security: people, processes and technologies. This translates into the following number of macro use-cases:

Read More »
TECHNOLOGY FOR PERSONAL CYBER SECURITY

TECHNOLOGY FOR PERSONAL CYBER SECURITY

As a result of the global pandemic currently ongoing, we rely on technology more than ever to do our work and interact with friends and family. Social distancing practices have led to the increased time spent in our homes and therefore more time spent on the internet.

Read More »
CYBER SECURITY AWARENESS FOR ORGANIZATIONS AND BUSINESSES

CYBER SECURITY AWARENESS FOR ORGANIZATIONS AND BUSINESSES

The ever-changing cyber threat landscape implies that all businesses should have a functional cyber security awareness program in place. In spite of the increased spending on IT security, cyber-crimes are on the rise. A recent study by Verizon shows that phishing is still the most prevalent threat action in successful data breaches related to social engineering and malware attacks.

Read More »
IMPORTANCE OF SECURITY EDUCATION, TRAINING AND AWARENESS

IMPORTANCE OF SECURITY EDUCATION, TRAINING AND AWARENESS

Most security tools that are meant to improve the cybersecurity resilience of an organization are very underutilized as the personnel meant to operate them do not have sufficient expertise. Providing security training for employees equips them with the knowledge to efficiently use the tools and become better defenders of the organization.

Read More »
Scroll to Top