Remove Energy and Utilities Remove Exercises Remove Security Remove Training
article thumbnail

Leaked documents from Russian firm NTC Vulkan show Sandworm cyberwarfare arsenal

Security Affairs

These projects include tools, training programs, and a red team platform for exercising various types of offensive cyber operations, including cyber espionage, IO, and operational technology (OT) attacks.” The company was commissioned for the development of tools, training programs, and a hacking platform.

article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

What if you could have this training more often, say, once a month. I’m Robert Vamosi and in this episode I’m talking about cyber ranges-- simulations that can both teach and improve the security of your networks. Layer two is going to be the automation of, say the security tools. Yeah, there’s red teams.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. Technology Security.

article thumbnail

Ethical Use of Data for Training Machine Learning Technology - Part 3

AIIM

This is the third part of a 3-part series on the Ethical Use of Data for Training Machine Learning Technology by guest authors Andrew Pery and Michael Simon. The nervous energy had been replaced with exhaustion. Balancing the Utility of AI and Ethical Bias. You can also check out Part 1 and Part 2 from this series.