Cyber Range: Who, What, When, Where, How and Why?

From: Government Technology

What works in training students to protect enterprises from data breaches? How can experienced cyberpros practice defending their networks from emerging cyberthreats? Where are the right tools, effective processes and hands-on techniques combined to simulate real-world challenges faced from hackers? The answer may be at a cyber range near you. Here’s why the trend is exploding.

BY Cadets gathered inside the Cyber Lab at Thayer Hall for the start of the 13th annual Cyber Defense Exercise. Credit: U.S. Army photo by Mike Strasser/USMA PAO

Cyberthreats are everywhere. Whether counting data breaches, individual ID thefts, system outages from hacker attacks or vulnerabilities detected to critical infrastructure, the growing numbers are staggering.

***

For more and more universities, enterprises, nonprofit groups and global governments, the answer is to build, or join or expand a cyber range. The concept is not new, but the explosion in interest in cyber ranges and participation is clear. Here are some recent examples:

Read Complete Article

Facebooktwittergoogle_plusredditpinterestlinkedinmail

Leave a Reply

Your email address will not be published.

Please Answer: *