Cybersecurity Training Red Team Training – 3 New Penetration Testing Training Scenarios March 12, 2020 by arpit The Red Team (Pentesters) represent the first line of offense in the security operations center. It is the role of the Red Team to identify potential entry points of an attacker on your network. Once inside the Red Team will perform various attack types to identify vulnerabilities in stop gaps across the network. However, performing […] Read more » Cyber Range Cyber Simulation Cyber Training Red Team SOC Training
Cybersecurity Training Keep Your Blue Team Up to Date with 6 New Scenarios on Cyberbit Range March 9, 2020 by arpit Your Blue Team is your defense against malicious attackers who seek to take the data you work so hard to develop and protect. Attackers are constantly evolving, developing new entry mechanisms, new attack types, and releasing attacks that defy your software stack. Your Blue Team is a human element capable of stopping these attacks and […] Read more » #blueteam Cyber Range Cyber Security Training Cyber Training SIEM
Cybersecurity Training Security Operations Strategies to Win the Cybersecurity Talent War January 28, 2020 by arpit Just when the industry mantra has finally been set in stone, leading cybersecurity talent recruiter challenges the belief that there just aren’t enough talented people to fill the mounting number of open cybersecurity positions. “The difficulty companies are facing recruiting has led to an all-out bidding war,” tells Karl Sharman, Vice President of BeecherMadden, a […] Read more » Cyber Range Cyber Security Training SOC SOC Training
Security Operations Recruiting SOC analysts? Here’s a pitch deck I use January 13, 2020 by arpit Dear SOC managers and recruiters, I feel your pain. The cybersecurity skill shortage is the bane of our existence. Recruiting and retaining top SOC analysts is vital to your company’s cybersecurity and reputation. It’s also basically Mission Impossible. But just as Ethan Hunt uses his wit, creativity and superhero prowess to get the job done, […] Read more » recruiting SOC Analyst
Cybersecurity Training 2019 Cyber Security Statistics December 17, 2019 by arpit As we wrap up another tumultuous year, here is a roundup of top cyber security statistics for 2019. Across the board, cybersecurity remains one of the most important priorities for any organization and has become a boardroom level conversation on an unprecedented scale. However, cybersecurity professionals who are on the frontlines of a perpetual and […] Read more » cyber security statistics 2019
Vulnerabilities AWS IMDS v2 Secures SSRF Vulnerability December 5, 2019 by arpit *The blog post was updated on May 2020. AWS EC2 instance metadata service (IMDS) has been in use by AWS customers for a long time, even though they don’t always realize it. IMDS provides a great deal of information about the instance and is very useful for application configuration. In this article, I would like to […] Read more » AWS IMDS SSRF
Security Operations SOC Efficiency Improving Thanks to SOAR November 28, 2019 by arpit Today, organizations are threatened by APTs from multiple vectors and cybersecurity teams need to respond within minutes. On top of this, they are also bombarded with too many alerts and an ever-growing number of security tools. This requires a new layer on top of the SIEM – which resulted in the birth of the SOAR […] Read more » SOAR SOC
Cybersecurity Training NIST NICE Cybersecurity Training November 25, 2019 by arpit The NIST NICE Framework On May 2nd, 2019, The White House Administration issued an Executive Order (EO) that stated: “a superior cybersecurity workforce will promote American prosperity and preserve peace.” The EO encourages widespread adoption of the NIST NICE Cybersecurity Framework, and its integration into education, training, and workforce development efforts. The NIST NICE Framework […] Read more » NICE NIST Cybersecurity Framework
Cybersecurity Training Is Your SOC Team Ready? November 23, 2019 by arpit It’s no news that our threat surface is exploding. Moreover, this is now a multi-dimensional expansion, almost a “big bang”. Horizontally – the threat surface is expanding: cloud, OT, IoT, 5G and other elements of our digital transformation are new entry points for threat actors. Each one, unfortunately, requires a different type of protection, but […] Read more » SOC Training