
Addressing 5 Concerns with Cyber Security Degrees: How Can Higher Education Help Prepare Cybersecurity Students?
Cybersecurity degrees often lack real-world application, focusing more on theoretical knowledge than practical skills. Learn how higher education can help students better prepare for the evolving job market.

Takeaways from Palo Alto Unit 42's Incident Response Report 2024
Palo Alto's 2024 Incident Response Report offers crucial insights into evolving cybersecurity threats. Key takeaways include improved incident detection, with organizations identifying 80% of incidents internally and reducing threat actor dwell time to 13 days. The report highlights a shift from phishing to internet-facing vulnerabilities, emphasizing the need for secure coding practices and effective patch management.

Combating Election Cybersecurity Threats
Protecting election integrity is crucial in today’s digital age. Key threats include social engineering attacks targeting election officials, DDoS attacks disrupting voter registration systems, and AI-generated disinformation influencing voters. To counter these threats, implement an election-specific incident response plan, share threat intelligence, ensure system redundancy, conduct independent audits, and engage in realistic cybersecurity training.

Cloud Range Selected as 2024 SC Awards Finalist for Best IT Security-Related Training Program
Cloud Range Named 2024 SC Awards Finalist
August 30, 2024 – Cloud Range is honored as a finalist for the 2024 SC Awards in the Best IT Security-Related Training Program category. This recognition celebrates Cloud Range's commitment to innovative, hands-on cybersecurity training. The winners will be announced on September 17, 2024.

5 Steps for Improving TTX: How to Create Tabletop Exercises That Are Actionable and Effective
To create actionable and effective tabletop exercises (TTX), organizations should focus on five key steps: simplify planning by defining clear objectives and using templates, integrate AI for scenario generation and automation, address compliance by aligning with regulatory standards, measure impact with defined metrics and post-exercise reviews, and ensure continuous improvement through regular updates and a learning culture.

Analyzing The 2024 Ticketmaster Breach
On May 28th, a filing to the Securities and Exchange Commission (SEC) by parent company LiveNation described launching an investigation with industry-leading forensic investigators to understand what happened. This quick action was a positive step after discovering the breach. The data breach notification suggests it took Ticketmaster 51 days to discover they’d been breached.

Cloud Range Recognized in the Gartner® Hype Cycle™ for Cyber-Physical Systems Security, 2024
Cloud Range has been recognized in the Gartner® Hype Cycle™ for Cyber-Physical Systems Security, 2024. Identified as a Sample Vendor for CPS Security Services, Cloud Range provides essential training and incident response solutions tailored for industries facing a shortage of skilled professionals.

The Science of Simulation Learning in Cybersecurity
Situated Cognition Theory emphasizes real-world learning, which, in cybersecurity training, ensures professionals gain hands-on experience, improving teamwork and decision-making skills. Cloud Range live-fire attack simulation exercises on a cyber range are evidence-informed practices backed by academic research and practical experience.

Using Live-Fire Simulations to Improve ICS/OT Threat Protection
Dr. Edward Amoroso of TAG Infosphere highlights the critical role of live-fire simulations in bolstering ICS/OT threat protection. Cloud Range's virtual cyber range enables IR teams to practice responding to diverse attack scenarios safely and collaboratively. This training not only enhances technical skills but also creates effective teamwork in safeguarding critical infrastructure.

Leading from the Frontlines: Developing Strong Incident Commanders
The cybersecurity incident commander plays an important role in managing cyber incidents effectively. Beyond technical expertise, they must understand their team’s skills and personalities to orchestrate a cohesive response. From assessing the attack’s scope to directing actions and team communication, their strategic oversight ensures efficient incident resolution and preventive measures.

Creating an ICS/OT Cyber Incident Response Plan
Creating an ICS/OT Cyber Incident Response Plan is crucial for safeguarding critical infrastructure. TAG Infosphere's Dave Neuman shares key strategies for integrating IT and OT systems, ensuring operational continuity, and preparing for future cyber threats.

The Pivotal Role of Live Incident Response Rehearsal in Cyber Resilience
In today's threat landscape, complete incident prevention is unrealistic. Effective cyber resilience balances prevention with detection and response. Live incident response rehearsals are essential, providing hands-on experience to prepare teams for real-world attacks. Gartner research highlights the importance of recovery, advocating for regular rehearsals to build technical and psychological resilience.

Shaping the SOC of Tomorrow: Insights from Debbie Gordon on CISO Tradecraft Podcast
In the podcast episode of CISO Tradecraft, Debbie Gordon shares key insights on building effective Security Operations Centers (SOCs). From hiring skilled personnel to proactive training, Gordon emphasizes the importance of staying ahead in cybersecurity. The discussion covers adapting to regulations, the future of training, and leveraging Cloud Range's solutions for live cyber-attack simulations.

Exploring the NICE Framework Q&A
We had many compelling questions in our recent webinar applying the NICE Framework across different sectors, its relevance to different levels of seniority within a cyber role, how organizations can align their cybersecurity training strategies with the Framework, and more.

Demystifying the NICE Framework
The National Initiative for Cybersecurity Education (NICE) Framework makes it easier for you to find and train the right people for your cyber team if you know how to use it. This blog outlines 5 steps.

Empowering Students to Succeed in the Cybersecurity Job Market
Experiential learning (ExL) is critical in cybersecurity. Hands-on, live-fire cyber range and simulation exercises help students succeed in the classroom – and ultimately in their role as cybersecurity professionals.