Cybersecurity Training Cyber Security Training Platform May 8, 2019 by arpit A robust cyber security training platform, or cyber range, is the foundation of the burgeoning cyber workforce. The world is seeing record demand for cyber security professionals, which is expected to reach 3.5 million unfilled positions worldwide by 2021. And while at first blush this figure may seem bloated, a cursory search shows otherwise: According […] Read more » Cyber Security Training
Cybersecurity Training Cyber Ranges India – Can they Train 3 Million Cybersecurity Pros? February 24, 2019 by arpit According to Gartner, the cybersecurity market is forecasted to grow by 8.7% to reach the whopping figure of 170 billion $ by the year 2022. Needless to say, cybersecurity can be a very lucrative career option for Indian young talent pool. This is a great opportunity for a country like India, which accounts for 67% […] Read more »
Security Operations Managed Security Services Succeed with Orchestration and Automation February 15, 2019 by arpit According to Gartner, the managed security services market is growing by more than 9.5% every year and has already surpassed $10 billion mark in revenue. The market has continued its strong growth as managed security services have become popular among businesses to secure critical assets and data. Managed security services bring with them various benefits […] Read more » managed security services MSSP
OT Security Airport Cyber Attack Risks February 7, 2019 by arpit Airports have always been highly targeted by malicious nation-state actors because they can result in high-profile disruption, causalities and damage a country’s reputation. In 2019, a grave new risk has reared its head – airport cyber attack. Modern airports are completely on emergent technologies such as the Internet of things (IoT), cloud and integrated systems […] Read more » airport cyber attack OT networks SCADA
Endpoint Security New Ursnif Malware Variant – a Stunning Matryoshka (Матрёшка) January 30, 2019 by arpit Ursnif malware is an information stealing/banking Trojan that has been around since 2016 and continues to evolve. Its capabilities include stealing of: System information List of installed applications List of installed drivers List of running processes List of network devices External IP address Email credentials (IMAP, POP3, SMTP) Cookies Certificates Screen video captures (.AVI) Financial […] Read more » Malware ursnif
Cybersecurity Training Cyber Security Grants for Education January 8, 2019 by arpit This blog was updated on December 28th, 2021. Demand for cybersecurity professionals will grow unabated over the next decade according to the Bureau of Labor and Statistics, which is predicting a 33% increase in job growth for information security analysts between 2020 and 2030. The supply of qualified cybersecurity professionals, however, is not keeping up […] Read more » college Cyber Security Grants for Education higher education university
Security Operations 6 Quora Security Breach Lessons December 9, 2018 by arpit Last week it happened again. News of the Quora Security Breach was officially announced late Monday afternoon in a company blog post and email directly notifying 100 million affected users. This kind of shocking news is no longer shocking, and everyone in the industry needs to prepare for the day it will happen to them. […] Read more » Data Breach incident response Quora Breach security breach
Cybersecurity Training Campus Cyber Range – Buy or DIY? December 3, 2018 by arpit In response to the booming demand for cybersecurity professionals, colleges and universities across the country are bolstering cybersecurity tracks within computer science curricula and even opening dedicated cybersecurity degree programs. Young people hoping to gain a fast track entrance into this exciting field are seeking out educational programs that will launch their careers. Many institutions […] Read more » college Cyber Range higher education university
Endpoint Security Malware Mitigation when Direct System Calls are Used November 27, 2018 by arpit In 2018 we have seen an increase in the malicious use of direct system calls in order to evade security product hooks. These hooks are used to monitor API calls which may hint to malicious activity. Direct system calls evasion method utilizes reading system call numbers from ntdll.dll, putting the appropriate system call number on […] Read more » malware mitigation