Blogs

Reduce your cyber risk. Improve your security posture. Increase your readiness.

SimSpace blog - SimSpace Cyber Risk Management Platform

September 16, 2022

How User Emulation Brings Cybersecurity Training to Life

When it comes to preparing your organization to defend against advanced cyber threats, there’s no substitute for hands-on experience. But how can your team gain familiarity with real-world cyberattacks without putting your company’s digital assets in jeopardy?

READ MORE

August 30, 2022

SimSpace Operator Awarded Coveted Black Badge at DEF CON 30

Every August, about 25,000 programmers descend upon Las Vegas to attend DEF CON, one of the world’s most well-known hacking conventions. Apart from building relationships with industry peers and putting their skills to the test, virtually everyone in attendance has one goal in mind — winning the Black Badge.

READ MORE

August 9, 2022

The SimSpace Partner Network Program - Partner with Confidence

The increasing prevalence of cybercrime and the ingenuity of these threat actors is something your clients cannot handle alone. There is no single person or company who knows everything and turning a blind eye to this bitter truth is an exercise in futility. According to a recent report by PWC1, nearly half of all businesses are being hit by economic crime, with cybercrime being the gravest threat.

READ MORE

August 8, 2022

Launch of SkillWise at Black Hat USA

This week at Black Hat USA in not-hot-at-all Las Vegas, Nevada, SimSpace unveiled the SkillWise training and readiness solution. Powered by the SimSpace cyber range platform, SkillWise provides realistic individual and team training environments, hands-on team experiences, advanced training content, detailed threat intelligence, and more. Essentially, it delivers everything cybersecurity leaders need to develop their teams.

READ MORE

July 12, 2022

Why Should You Care About Cyber Ranges?

Read any news report today, and you’ll notice that novel cyberattacks constantly bombard organizations of all sizes. High-profile attacks in 2022 included targeting cryptocurrency markets with ransomware and currency exchange hacks. These highly-publicized attacks often drive cross-industry demand for cybersecurity products, with organizations panic-buying products to defend against the latest trend in attacks – but there is a better way. 

READ MORE

June 16, 2022

RSA 2022 - Back in [almost] full force

The RSA conference was back in person in San Francisco’s Moscone Center last week. Although it has had almost a 60% drop in attendance since its peak in 2019, it was clear from the energy level that people were excited to be back in person. Due to the disruption caused by the global pandemic, there has been an increase in the prevalence of cyberattacks. Consequently, cybersecurity has remained a hot space. As demonstrated by many conspicuous booths on display, M&A activity and venture funding in the cybersecurity industry have rapidly increased since 2020.

READ MORE

May 26, 2022

Nine Use Cases for Advanced Cyber Ranges

Today’s CISOs must reduce risk by building and maintaining confidence in their organizational cyber security posture, but this is no easy task. Although plenty of security products on the market claim to provide “everything” you need, coverage gaps can and do exist between tools. Additionally, their personnel are inexperienced, overworked and their processes are untested. 

READ MORE

May 20, 2022

Adding Realism to Security Team Training and Technology Assessments

Organizations spend millions of dollars on tools and personnel to defend their valuable data, intellectual property and reputation. However, most cybersecurity leaders don’t always know how well their teams or tools are working. Even if organizations hire the most qualified people and use best-in-class tools, it may not be enough to effectively defend their network. To be properly prepared, cybersecurity practitioners need to hone their team skills and assess tools under the most realistic conditions – which requires a high-fidelity cyber range using user emulation. 

READ MORE

April 28, 2022

HFS Hot Vendor Fireside Chat with SimSpace

As organizations race to embrace the cloud and empower remote workers, IT and security teams are caught between enabling business while also ensuring the highest level of security. It’s a difficult balance, for sure. The attack surfaces are ever sprawling, and looser deployment paradigms can often expose more vulnerabilities to an organization's networks and data. 

READ MORE

April 7, 2022

The Five Essential Elements of Impactful Red vs. Blue Exercises

Experience is vital when preparing to battle cybersecurity threats, but is it possible to gain experience and avoid the pain that usually comes with it? In a word, yes. Red vs. Blue events (RvBs) enable cybersecurity individuals and teams to practice responding to actual attacks in a safe and isolated simulated network. These events provide highly impactful learning experiences where SOC leads and team members can apply their cybersecurity skills, enhance trust and collaboration between teams, while testing and refining incident response processes. With RvB training, organizations can improve their defenses without the pain of actual data loss or downtime. 

READ MORE

March 31, 2022

Pushing Zero Trust Solutions Into Production

Whether or not you’ve been following our blog series, by now you’ve probably heard of the Zero Trust Architecture (ZTA). And while most security practitioners have already embraced the notion of continuous user and device validation, Executive Order 14028 made ZTA a mandate for the federal government’s civilian agencies and their IT vendors.

READ MORE

March 25, 2022

How to Validate your Zero Trust Implementation

It’s well established that cybersecurity is more than an IT concern. From supply-chain availability to consumer data privacy, cyber events can have a profound and lasting impact on business continuity and brand value. Even non-tech-savvy business leaders understand how closely linked organizational and personal success are to cybersecurity outcomes, this is why Zero Trust Architecture (ZTA) has become a hot topic for us to explore. 

READ MORE