Military Cyber Training Methods

There's a war raging between criminal hackers and corporate computer defense systems, and when it comes to wars, military organisations know how to fight them best.

The Israeli military is known for the high quality of its cybersecurity training, and that's what Cyberbit's Cyber Range offers: The same military-grade training and simulation systems.

Cyberbit was founded in 2015 as a subsidiary of Elbit Systems, a leading Israeli defense contractor. Its goal is to commercialise the cybersecurity training and technologies Elbit had developed in its work with Israel's military and government agencies.

Distributing this former military technology more widely makes sense in today's world, because all companies are essentially on the front lines of a raging cyber war. The military is good at monitoring national borders, but today's borders are much closer. They are in the firewalls and routers.

A corporation's cybersecurity teams are its first responders to a serious attack, and they need to coordinate the use of many different tools within a tight timeframe.

"It's not enough to buy security tools, you need to make sure your people know how to use them and how to combine them against multi-stage attacks," says Adi Dar, CEO of Cyberbit.

"When a company is under attack, people have to know how to work in teams and how to make quick decisions under intense pressure. We make sure they know what to do under many different situations."

Cyberbit's Cyber Range systems get its name from a firing range -- a place where the military tests its weapons and the skills of its soldiers. Cyberbit argues that the same approach should apply to corporate security training: The ability to test the performance of security tools and people in real-world environments.

A key capability of the Cyber Range is being able to create a virtual model of a company's IT network -- its routers, servers, and software, and then simulate many different types of attacks in real-time. These systems are regularly updated to train teams on best ways to respond to the latest types of cyberattacks such as Ransomware. They can also be used to research future possible attack scenarios and proactively prepare defenses.

"The best cybersecurity teams are the ones with the most experience," says Dar. "Our simulations are hyper-realistic which means teams can build experience in dealing with some of the worst and most damaging attacks and then learn from any mistakes without risking the organization."

The shortage of cybersecurity experts in the US is a key driver of Cyber Range system sales as universities and colleges create new courses to meet high demand. Cybersecurity Ventures predicts as many as 3.5 million open cyber security jobs in 2021. Dar says that customers also use the Cyber Range systems to test job applicants and make sure their teams have the required mix of skill sets.

Cyber Range systems have been installed in many US locations and also in India, Australia, France, Germany, and Austria.

Cyberbit also offers Security Orchestration, Automation, and Response software; Industrial Control Systems security; and Endpoint Detection and Response tools. These help filter out high alert volumes created by the complexity of IT systems and can be used in combination against multi-level attacks.

The company is constantly evaluating new security threats. Its Malware Research team recently analysed a new version of the Ursnif Trojan, a highly sophisticated malware creation that uses a file-less technique to hide and steal data

ZDNet

You Might Also Read:

Revealed: Top Secret Israeli Hackers For Hire:

 

 

« White Hat Female Hacker Leads The Way
Meeting The Cyber Talent Challenge Head-On »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Secunet Security Networks

Secunet Security Networks

Secunet is a leading cyber security company offering a combination of consultancy and products, delivering the highest level of security for data, applications and digital identities.

Cyber Security Associates (CSA)

Cyber Security Associates (CSA)

Cyber Security Associates provides cyber consultancy and cyber managed services which help to detect, protect and educate against the ever-changing cyber threat.

Centre for the Protection of National Infrastructure (CPNI)

Centre for the Protection of National Infrastructure (CPNI)

CPNI works with the National Cyber Security Centre (NCSC), Cabinet Office and lead Government departments and agencies to drive forward the UK's cyber security programme to counter cyber threats.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

Segusoft

Segusoft

With its encryption platform SEGULINK, Segusoft provides standard software for companies to securely transfer files and messages.

Next47

Next47

Next47 is a global venture firm, backed by Siemens, committed to turning today's impossible ideas into tomorrow's indispensable industries.

BTblock

BTblock

Blockchain and cybersecurity is a vital combination for Enterprise success. BTblock is a Force Multiplier for its clients.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Char49

Char49

Char49 specialize in Penetration Testing, Red Team Assessment, Social Engineering and Security Research.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

KSOC Labs

KSOC Labs

KSOC is an event-driven SaaS platform built to automatically remediate Kubernetes security risks.

AdvIntel

AdvIntel

AdvIntel is a next-generation threat prevention and loss prevention company launched by a team of certified investigators, reverse engineers, and security experts.

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

ReachOut Technology

ReachOut Technology

ReachOut is a transformative approach to IT Security, Support, and Guidance. But we’re more than that. We’re passionate IT experts driven to make solutions to your problems.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.