Request a demo

Blogs

May 30, 2023

Threat Detection and Response Best Practices

When your organization is hit with a cyberattack, every second counts. The more time an attacker spends in your systems, the more likely they will inflict serious damage, leading to systems downtime, data loss and skyrocketing recovery costs.

READ MORE

May 23, 2023

How Cyber Ranges Help Organizations Achieve Cyber Readiness

How can you prevent a cyber attack? Unfortunately, you can’t. But you can control how prepared you are to respond to a potential attack.

READ MORE

May 10, 2023

Red Team vs. Blue Team: Cybersecurity Teaming Exercises Explained

As security teams face off against attackers, they need to know that their technical security controls and detection rules work as intended. To validate their processes and technologies, cybersecurity teams engage in penetration testing, a type of authorized simulated attack against the company’s systems that evaluate a security program’s effectiveness.

READ MORE

May 1, 2023

5 Key Takeaways from RSA 2023

RSA 2023 is officially in the books, and it was an excellent event for SimSpace. In the picture above, you can see that we had great weather, and yes, I took that picture with my phone. Attendance at RSA was reported to be over 40,000 people, 600 vendors, and 500 press and analysts. SimSpace and our booth partners Cymulate and Cyconito saw great booth traffic and had a very busy week. As I look back on the week, I have five key observations:

READ MORE

April 25, 2023

Join us, RSA Conference 2023 at Booth 2045

Join SimSpace - Booth 2045, Moscone Center’s South Expo Hall together with Google-Mandiant, Cycognito, and Cymulate at RSA Conference 2023. We will show you how to find answers to the most challenging cyber security and governance questions with our Military-Grade Cyber Ranges.

READ MORE

April 13, 2023

Quantum (Computing) Mania: A Sneak Peek into the Quantum (Computing) Realm

There’s been some quantum-mania in the cybersecurity world recently, and it’s had little to do with the recent and underwhelming (in my personal opinion, of course) Ant-Man movie by the same name. Instead, it’s the looming, double-edged sword of quantum computing, its potential and its impacts that has been captivating the minds of those in the cybersecurity field and even beyond us nerds into the mainstream consciousness. And this is for a good reason: it has the potential to revolutionize many facets of our lives, from our cybersecurity work to everyday activities.

READ MORE

April 10, 2023

From IT to OT: SimSpace's Cyber Range for Simulation and Testing in Critical Infrastructure

In recent years, the world has witnessed an increasing number of cyberattacks targeting operational technology (OT) systems, which are the backbone of critical infrastructure such as power grids, water treatment plants, transportation systems, and more. The consequences of a successful cyberattack on these systems could be catastrophic, leading to widespread disruption, damage, and even loss of life.

READ MORE

April 6, 2023

Cybersecurity for the C-Suite in 2023

Strategic Cybersecurity Challenges for the C-Suite Forgive me for stating the obvious, but your organization's cybersecurity performance can significantly impact revenue, brand, and stock price. The goal of this blog is not to perpetuate fear-mongering. The goal is to acknowledge that cybersecurity is part of your business differentiation and can be used to create a strategic advantage. According to the PwCs Global Digital Trust Insights Survey of over 1,700 directors and C-suite executives, they prioritize cybersecurity to create strategic and competitive differentiation.

READ MORE

April 3, 2023

Endpoint Detection and Response (EDR) Solutions

As part of my series of blogs that review the network security components, I will be reviewing the various EDR solutions on the market today. Of all the security components, there are as many vendor options as you could imagine. Logos, colors, brands, price points, and parts of platform ecosystems there are many ways to decide which is best for you and your organization. I took a look and quickly found over 20 EDR Solutions on the market

READ MORE

March 30, 2023

5 Types of Live-Fire Exercises to Enhance Cyber Readiness

What is a Live-Fire Exercise? A type of cybersecurity exercise known as a live-fire exercise (LFX) is a controlled, real-world simulation of a cyber attack where an organization's cybersecurity team actively responds to a simulated threat. This practice allows teams to assess their preparedness, identify weaknesses, and improve their response capabilities. By simulating a real cyberattack, teams can evaluate their defenses and tactics, learn from their mistakes, and refine their strategies.

READ MORE

March 28, 2023

How to Build an Elite Cyber Ops Team

In the rapidly evolving digital landscape, cyber threats are becoming more sophisticated daily. As a result, organizations are under increasing pressure to build and maintain effective cybersecurity teams.

READ MORE

March 24, 2023

PTP - The Tri-Factor Approach to Cybersecurity: People, Technology, and Procedures

Cybersecurity has become an increasingly critical aspect for businesses of all sizes and industries. To ensure the protection of sensitive data, companies must invest in people, technology, and procedures. In this article, we will discuss the top 8 reasons why investing in people, technology, and procedures is important for cybersecurity and how money can be saved without risking a reduction in security.

READ MORE