- Application Performance
- Cyber Range Deployment
- Data Center Performance
- Load Balancer Testing
- Low Latency Networks
- Mobile Network Security
- Mobility Performance
- Network Performance
- Network Security
- Network Visibility
- Product R&D
2011 Blog Rewind: Cyber Range Deployment
During the last two weeks of the year we are recapping some of the most popular topics covered on the blog during 2011. So far we have reviewed mobility testing, security research, DDoS, and now today, cyber range deployment. Cyber ranges are critical tools used to recreate cyber war conditions in order to harden IT infrastructure, train cyber warriors, and perform cutting-edge cyber security research.
Take a look at some of our top blog posts around cyber range deployment in 2011:
“Cyber warfare training” is emerging as a new military discipline, and the U.S. military has now made cyber security education and conditioning mandatory during basic training. Cyber warfare training is done in various ways, from in-depth classroom studies to live exercises using federated cyber ranges. It has become obvious that nation states and military organizations must prepare themselves and train their personnel to recognize, prevent, and combat cyber attacks. This post dives into how the U.S. European Command (EUCOM) is conducting cyber range exercises.
In an era of steep budget cuts for the U.S. Department of Defense, the objective in government circles has been to “get small” — to do more without spending more. Although some budget allocations for cyber security may be protected from cuts, the imperative to get small still makes sense. Smaller typically means more agile, easier to deploy widely, and, of course, less costly. Use this post to learn how to get small and arm cyber defenders.
Every organization, whether part of the government or the private sector, needs “battle-tested” IT personnel in order to defend its networks against attack. The most effective way to provide this experience is to recreate the exact scenarios, no matter how nefarious, they will see in the real world. This two-part post goes into 'cyber war-gaming', exercises that bring IT personnel from different specialties into color-coded red, white, and blue teams that perform specific roles in attacking and defending IT infrastructures.
The above posts show how organizations worldwide face a dangerous shortage of personnel with the skills required to defend against cyber attack. This urgent situation is made worse by the weaknesses and vulnerabilities that continue to pervade critical IT infrastructures. Cyber range deployment helps answer these problems. Leveraging BreakingPoint’s extensive work in building cyber range technology, this white paper details how to deploy this evolved simulation environment.
Earlier in the year I sat down with BreakingPoint’s Director of Product Management to discuss how organizations such as DISA, EUCOM, and Northrop Grumman have deployed cyber range technologies. Now you can revisit this informative webcast.
Additional Blog Rewind 2011 Topics:
blog comments powered by Disqus