Cyber Security News and Podcasts from CYBER RANGES

The CYBER RANGES blog is a leading source of industry-led, expert, Cyber Security News, and Information about critical business and cybersecurity for companies, governments and professionals worldwide.

Podcasts, News and Event Updates

Name(Required)
What best describes your use case?(Required)
This field is for validation purposes and should be left unchanged.

IMPORTANCE OF SECURITY EDUCATION, TRAINING AND AWARENESS

IMPORTANCE OF SECURITY EDUCATION, TRAINING AND AWARENESS

Most security tools that are meant to improve the cybersecurity resilience of an organization are very underutilized as the personnel meant to operate them do not have sufficient expertise. Providing security training for employees equips them with the knowledge to efficiently use the tools and become better defenders of the organization.

Read More »
EMAIL SECURITY 101 DATA PROTECTION

EMAIL SECURITY 101 DATA PROTECTION

Despite the rise of collaboration tools such as Skype and Slack, email is still the most common tool for businesses to communicate and manage their day-to-day operations. However, email is one of the easiest ways for cyber-criminals to target organisations because of its easy access and risk of vulnerability from human error.

Read More »
HAT HACKERY AND THE COLOUR SPECTRUM

HAT HACKERY AND THE COLOUR SPECTRUM

Hacker, a word that seems to be appearing with greater frequency in the media for the last few years. A word that has been completely distorted by the media for the better part of the last thirty years. A word that has become almost synonymous with criminal, and which requires a qualifier in front of it to try and signify otherwise (“ethical” hacking), and still manages to leave some people unconvinced.

Read More »
MALWARE NEWS AND LATEST TRENDS ON INFOSECURITY

MALWARE NEWS AND LATEST TRENDS ON INFOSECURITY

The Valak malware loader is now remodelled to attack in stealth mode and is being used to steal personal data in a more sophisticated way. The creators of this malware are adopting the MaaS (malware as a service) model in collaboration with other threat actors. This new version of Valak 2.0 is known to steal sensitive information from Microsoft Exchange mail systems as well as credentials and domain certificates.

Read More »
LEARN TO SELECT THE RIGHT CYBER RANGE FOR YOU!

LEARN TO SELECT THE RIGHT CYBER RANGE FOR YOU!

With the growth of internet connectivity and cloud services usage, the world has become a virtual village. Your company’s data is just a hack away. Cybercriminals are becoming more and more adept at navigating security systems and breaching them. That is why cybersecurity is so critical today. Cybersecurity pertains to protecting data from theft and damage by criminals and enemies. You may be interested in protecting:

Read More »
RISK MANAGEMENT IN IT SECURITY

RISK MANAGEMENT IN IT SECURITY

In an increasingly digital world, organizations are constantly facing dynamic threats that pose different levels of risk to their digital resources, employees and reputation. A breach of a company’s network could have far-reaching consequences including financial losses, unending lawsuits and permanent loss of reputation.

Read More »
Scroll to Top