Blogs

November 8, 2022

Xtreme Solutions Stays Competitive Using the SimSpace Cyber Range

The challenges of building and maintaining its home-grown cyber range were putting Xtreme Solutions at a competitive disadvantage. And although their solution worked, the time, money, and energy needed to keep their range operational were holding back their business – especially as they began to expand their suite of cybersecurity solutions. We recently sat down with their director of cybersecurity to get an insider's perspective on why they chose the SimSpace cyber range to meet their challenges.

READ MORE

October 20, 2022

Threat Alert – Emotet: A Dangerous Real-World Example of an Advanced Persistent Threat

Identified initially in 2014, Emotet malware has persisted in disrupting many industries. This resilient malware program delivers different malicious payloads to unsuspecting users. It has continued to push our cybersecurity posture, hunting capabilities, and response mechanisms to (hopefully) new limits in all sectors. First introduced as a banking trojan (disguised as something innocuous), Emotet has exhibited rapid growth, agility, and resilience. In fact, Emotet has continually evolved and honed its nefarious capabilities to become a MaaS (Malware-as-a-Service) offering in 2017.

READ MORE

October 6, 2022

ACSC-SimSpace Cyber Range Program: Live Fire Red Team

Collaborative Defense Collaborative Defense is a core principle for the Advanced Cyber Security Center (ACSC) and the Cyber Range program puts front line cyber defenders, our Blue Teamers, up against a live adversary – the SimSpace Red Team.

READ MORE

October 4, 2022

The Importance of Privileged Access Management

Recently, I received a call from a former colleague. They were concerned about some odd alerts they repeatedly saw across the enterprise. These alerts suggested that an outside actor may have obtained a service account credential in hopes of gaining access to other accounts. They were having issues hunting down the offending origin of the account authentication requests due to some gaps in their auditing capabilities and asked for my view. I’m not sure how others spend their Saturdays, but this challenge is right up my alley!

READ MORE

September 16, 2022

How User Emulation Brings Cybersecurity Training to Life

When it comes to preparing your organization to defend against advanced cyber threats, there’s no substitute for hands-on experience. But how can your team gain familiarity with real-world cyberattacks without putting your company’s digital assets in jeopardy?

READ MORE

August 30, 2022

SimSpace Operator Awarded Coveted Black Badge at DEF CON 30

Every August, about 25,000 programmers descend upon Las Vegas to attend DEF CON, one of the world’s most well-known hacking conventions. Apart from building relationships with industry peers and putting their skills to the test, virtually everyone in attendance has one goal in mind — winning the Black Badge.

READ MORE

August 9, 2022

The SimSpace Partner Network Program - Partner with Confidence

The increasing prevalence of cybercrime and the ingenuity of these threat actors is something your clients cannot handle alone. There is no single person or company who knows everything and turning a blind eye to this bitter truth is an exercise in futility. According to a recent report by PWC1, nearly half of all businesses are being hit by economic crime, with cybercrime being the gravest threat.

READ MORE

August 8, 2022

Launch of SkillWise at Black Hat USA

This week at Black Hat USA in not-hot-at-all Las Vegas, Nevada, SimSpace unveiled the SkillWise training and readiness solution. Powered by the SimSpace cyber range platform, SkillWise provides realistic individual and team training environments, hands-on team experiences, advanced training content, detailed threat intelligence, and more. Essentially, it delivers everything cybersecurity leaders need to develop their teams.

READ MORE

July 12, 2022

Why Should You Care About Cyber Ranges?

Read any news report today, and you’ll notice that novel cyberattacks constantly bombard organizations of all sizes. High-profile attacks in 2022 included targeting cryptocurrency markets with ransomware and currency exchange hacks. These highly-publicized attacks often drive cross-industry demand for cybersecurity products, with organizations panic-buying products to defend against the latest trend in attacks – but there is a better way. 

READ MORE

June 16, 2022

RSA 2022 - Back in [almost] full force

The RSA conference was back in person in San Francisco’s Moscone Center last week. Although it has had almost a 60% drop in attendance since its peak in 2019, it was clear from the energy level that people were excited to be back in person. Due to the disruption caused by the global pandemic, there has been an increase in the prevalence of cyberattacks. Consequently, cybersecurity has remained a hot space. As demonstrated by many conspicuous booths on display, M&A activity and venture funding in the cybersecurity industry have rapidly increased since 2020.

READ MORE

May 26, 2022

Nine Use Cases for Advanced Cyber Ranges

Today’s CISOs must reduce risk by building and maintaining confidence in their organizational cyber security posture, but this is no easy task. Although plenty of security products on the market claim to provide “everything” you need, coverage gaps can and do exist between tools. Additionally, their personnel are inexperienced, overworked and their processes are untested. 

READ MORE

May 20, 2022

Adding Realism to Security Team Training and Technology Assessments

Organizations spend millions of dollars on tools and personnel to defend their valuable data, intellectual property and reputation. However, most cybersecurity leaders don’t always know how well their teams or tools are working. Even if organizations hire the most qualified people and use best-in-class tools, it may not be enough to effectively defend their network. To be properly prepared, cybersecurity practitioners need to hone their team skills and assess tools under the most realistic conditions – which requires a high-fidelity cyber range using user emulation. 

READ MORE