Is Cybersecurity Training a Good Investment?

Is Cybersecurity Training a Good Investment?

Is Cybersecurity Training a Good Investment? Simply said… Yes. Yes, it is. Our modern world is highly dependent on internet-connected technology. From medicine to energy infrastructure, both public and private organizations rely on computers doing as they are told...
6 Risks of Not Conducting Continuous Cybersecurity Training

6 Risks of Not Conducting Continuous Cybersecurity Training

6 Risks of Not Conducting Continuous Cybersecurity Training Cybersecurity training is vital. In a field where conditions on the ground change constantly, it is crucial that professionals are equipped with the knowledge and expertise they need to be effective in a...
What is a Cyber Range? A Definitive Guide and Definition

What is a Cyber Range? A Definitive Guide and Definition

What is a Cyber Range? A Definitive Guide and Definition Everything in the modern world relies on internet-connected technology. We trust technology to do as it’s told, and to be there when we need it. And technology is so prevalent that it’s almost invisible. From...
Capture The Packet AWS Partnership a Success at DEF CON

Capture The Packet AWS Partnership a Success at DEF CON

Capture The Packet AWS Partnership a Success at DEF CON In even more news on the DEF CON front, we are celebrating our integration with AWS to bring Capture The Packet, in all it’s forms, to the world during the conference! While we entered into this integration...
Packet Hacking Village a Huge Hit at DEF CON!

Packet Hacking Village a Huge Hit at DEF CON!

Packet Hacking Village a Huge Hit at DEF CON! By the time this goes up, the DEF CON 28 Safe-Mode convention will have come and gone. We have another article up talking about getting the convention stood up, so here we want to talk about how our very own Packet Hacking...