article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

I met up again with him a few years later when I went to a writer's workshop -- but that’s another story. If I just had three VMs and it just run the attack, it becomes very easy to find the attack, which one is the needle in the haystack, find the attack with 1000s of virtual users using Outlook and browsing the webinar.