ThreatGEN, an operational technology (OT) security firm, announces their partnership with Blumira, an automated detection and response provider to deliver a full stack OT cybersecurity monitoring solution that helps define and monitor an organization’s cybersecurity posture as well as bridge the information technology (IT) / OT gap.

Read More

It’s official! The long awaited [ThreatGEN® Red vs. Blue] 1.4 update has been released! This updated has tons of new features and visual enhancements that increase the player experience and overall depth of the game.

Read More

Art Conklin, professor of Computer Information Systems and Information System Security says, “It will become a major part of our curriculum going forward, The whole problem-solving aspect is difficult to simulate in class. This game allows us to do that.”

Read More

ThreatGEN announced the upcoming release date for the version 1.4 release, a major “game changing” update, of their ThreatGEN® Red vs. Blue gamulation – the world’s first online, player vs. player, computer game designed to teach real-world security.

Read More

In this video, Pascal walks through the process of installing, configuring and updating a Security Onion Appliance. Security Onion is a free and open source Linux distribution for threat hunting, enterprise security monitoring, and log management.

Read More

CyberCon, a CISO summit and cybersecurity workforce development conference for industrial utility, announced today it has partnered with industrial cybersecurity services and training firm, ThreatGEN. Clint Bodungen, ThreatGEN co-founder and lead author of Hacking Exposed: Industrial Control Systems, will serve as CyberCon’s industrial cybersecurity content advisor. CyberCon 2020, scheduled for March 30 – April 1 at the Anaheim Convention Center in Anaheim, Calif., is the must-attend, solutions-based cybersecurity conference series for leaders, decision makers and executives in the power and utilities industry, as well as those new to, or interested in a career in industrial cybersecurity.

Read More