Request a demo

Blogs

February 16, 2022

How to Build Confidence in Your Cybersecurity Program

This year will be the biggest test to date for security organizations. With a rapidly changing threat landscape, sprawling attack surfaces with remote workforces, and exponential growth in ransomware attacks, organizations of every size are revisiting their security priorities to ensure business continuity.

READ MORE

February 3, 2022

Building Cyber Efficiency with the LEAP Framework

Cybersecurity professionals track a ton of information. From the numerous tools they manage to the various frameworks commonly used, the amount of information and data collected helps guide their efforts towards cyber maturity. But all these inputs and responsibilities can easily be overwhelming.

READ MORE

January 27, 2022

Seven Critical Steps to Defending Against PwnKit

On January 25th, 2022, the Qualys Research Team publicly disclosed a memory corruption vulnerability in polkit (pkexec), a component included in every major Linux distribution. The exploit, known as PwnKit, is now tracked as CVE-2021-4034.

READ MORE

January 26, 2022

Cybersecurity Predictions for 2022, Part Deux

Yes, 2021 was the kind of year that we thought we needed another predictions blog (check out the first one if you missed it; Nine Cybersecurity Predictions for 2022). Of course, the start of a new year is often about what’s coming next, but don’t forget to reflect on and be proud of what your organization accomplished in the last year.

READ MORE

January 24, 2022

Managing Risk, Realities, and Results in 2022

As 2022 gets underway and organizations begin to execute on their plans for the new year, Shaun Walsh, Vice President of Marketing, and Kent Wilson, Director of Sales Engineering, had the opportunity to join ActualTech Media for a webcast to discuss managing risk, realities, and results in 2022.

READ MORE

January 19, 2022

Cybersecurity Vulnerabilities: Avoid These 3 Common Mistakes

Just as your organization is growing and evolving, so, too, is the cyber threat landscape.

READ MORE

January 7, 2022

Nine Cybersecurity Predictions for 2022

2021 became a bell-ringing year for cybersecurity. From the ransomware attacks of Colonial Pipeline and JBS to the hacks at financial organizations and educational institutions, the number of attacks against global organizations continues to rise. And now, even with President Biden’s call for a whole-of-nation approach to cybersecurity, security professionals everywhere are preparing for another challenging year ahead.

READ MORE

January 5, 2022

3 Misconceptions About Cyber Range Training

Is your organization continually held back by the growing cybersecurity workforce skills gap, or is your IT leadership team tired of hearing all the ways a cyberattack could negatively impact your organization? Cyber ranges provide a perfect solution for addressing any skills gap, preparing for cyber threats, and improving security processes.

READ MORE

December 22, 2021

Ask Us Anything: 5 Answers to Your Questions About Cyber Range Security

A quick read of the headlines will show that, eventually, your organization will find itself in the crosshairs of a cyber-criminal.

READ MORE

December 8, 2021

How to Build a Cyber Range on AWS

Businesses have always tried to adapt and innovate when it comes to cybersecurity, but in today’s marketplace, doing so is more critical than ever.

READ MORE

November 24, 2021

Cyber Range Exercises: 5 Expert Examples To Try

If you ask any athlete what helps them excel at their sport, most will tell you it is investing time in training, seeking the best coaching, and mastering the latest techniques. The result of this investment in training and practice is being fully prepared, both mentally and physically, for the real thing.

READ MORE

November 10, 2021

Understanding the 4 “W’s” of a Cyber Range

As the adage goes, practice makes perfect. This is true of all skills, including protecting your organization’s valuable assets and customer data from cyberattacks.

READ MORE