ThreatGEN® Red vs. Blue Fall Kickoff: New Features, New Maps, and a 50% Off Sale!
TLDR: We are thrilled to announce the latest update to our ThreatGEN® Red vs. Blue Cybersecurity Simulation Platform! And, to celebrate this new release, we’re offering a Fall Kickoff 50% sale! (Use Code: WINTERISCOMING – Offer ends September 30). For those unfamiliar with ThreatGEN, we offer a game-based platform that revolutionizes Incident Response (IR) Tabletop…
Too Important to Skip, Too Broken to Ignore: Fixing the IR Tabletop Exercise
What is an IR Tabletop Exercise? An incident response (IR) tabletop exercise is a discussion-based simulation where participants gather to walk through potential response procedures for a hypothetical cybersecurity incident scenario. The goal is to validate whether the organization’s incident response plan and procedures are effective and to identify any gaps that need to be…
The Real Threat of Ransomware: Why Cyber Criminals Prefer This Attack Method Even for Industrial Organizations
cybersecurity, incident response, ir, ransomware, ThreatGEN
|Ransomware attacks have become an increasingly common threat to organizations of all types, from small businesses to large industrial organizations. While cyber-physical attacks are often seen as the greatest threat to industrial organizations, ransomware attacks can still have significant physical and/or life-threatening consequences. As demonstrated by recent incidents such as the attack on a hospital in Germany that caused the death of a patient, and the ransomware attack on a major airline in the United States that resulted in flight cancellations and disruptions to travel, the impact of ransomware on industrial systems can be just as serious as that of cyber-physical attacks, if not more so. Furthermore, many industrial organizations have complex supply chains that rely on interconnected systems and processes, so an attack on one organization can have ripple effects throughout the entire supply chain, as seen in the recent incidents involving the Colonial Pipeline and the world’s largest meat supplier, JBS. Given the ease of deployment and potential for profit, ransomware remains a serious threat to organizations, and it is essential for organizations to take steps to protect themselves against these types of attacks.
Tabletop Exercises in Cybersecurity and Beyond
cybersecurity, Tabletop Exercise, ThreatGEN® Red vs. Blue, TTX
|Learn how tabletop exercises can improve your cybersecurity plans and procedures and discover the next level of innovation in TTX.
ThreatGEN Increases Cybersecurity Student Engagement Aligned with Key Learning Objectives
cybersecurity, cybersecurity training, learning objectives
|ThreatGEN® Red vs. Blue provides a mapping to Bloom’s Taxonomy for student learning objectives.
Achieving a Stronger Cybersecurity Workforce
Despite a skills shortage in the cybersecurity industry, simply having a college degree is no longer enough. It’s still a competitive industry and employers are looking for candidates that are well qualified. Students need an educational program that prepares them for real-world cybersecurity and a successful career path. Unfortunately, traditional training methods just might not make the grade any longer. So, how do educators provide students with a solid cybersecurity foundation and set them up for success in the real world?
OT Cyber Risk Management – You’re Probably Doing It Wrong
cybersecurity, OT, riskmanagement
|The 3 Most Common Problems That Nearly ALL Cyber Risk Management Programs Have, and How to Solve Them In this article, I will discuss the 3 most common mistakes people still make when assessing and addressing OT cyber risk management (hint: most of you are still doing it backwards), and ways that you can make…
Florida Water Treatment Plant Attack
cybersecurity, Florida water treatment plant attack, IDMZ, industrial cybersecurity, Industrial DMZ
|Since there are plenty of threat monitoring sources throughout our industry, we thought it best not to repeat those concerning the Florida water treatment plant attack. ThreatGEN believes it is worthwhile to have a lessons learned after the the dust settles though. The reason we didn’t release immediately after the event, like everyone else, is…
CTF – “You keep using that word. I do not think it means what you think it means.”
CTF, cybersecurity, cybersecuritytraining, ThreatGEN, ThreatGEN® Red vs. Blue
|Capture the flag (CTF) competitions are played in the cybersecurity community all over the world. What is its history? What are we missing?
What Could the SolarWinds Attack Mean for OT?
cybersecurity, industrialcybersecurity, Orion platform, solarwinds
|Jonathan Bundy reviews the SUNBURST malware attack on SolarWinds clients.