Analysis of a Water Treatment Plant Attack
OT Security Michele Lara OT Security Michele Lara

Analysis of a Water Treatment Plant Attack

Unlock essential insights from a recent cyberattack on a water treatment plant to enhance security for industrial control systems (ICS). Discover the vulnerabilities exploited in the attack, effective mitigations to secure critical infrastructure, and understand how the integration of IT and OT networks can both optimize operations and introduce risks.

Read More
5 Ransomware Mistakes
Cyber Range Training Michele Lara Cyber Range Training Michele Lara

5 Ransomware Mistakes

Ransomware incidents have unique characteristics and challenges, and teams coming into cyber ranges for attack simulation exercises can make mistakes while practicing their response. Explore the five common mistakes observed in ransomware training sessions.

Read More
ICS/OT Security: Insights from NIST Guide
OT Security Michele Lara OT Security Michele Lara

ICS/OT Security: Insights from NIST Guide

The integration of operational technology (OT) with IT systems, fueled by the Industrial Internet of Things (IIoT) and digital transformation, elevates vulnerability to cyber threats. Prioritizing OT cybersecurity through NIST Special Publication 800-82r3 strategies is crucial for safeguarding the reliability and safety of critical infrastructure.

Read More
With a Two-Year Revenue Growth of 411%, Cloud Range Ranked No. 44 on Inc. Magazine’s List of Fastest-Growing Private Companies in the Southeast Region
Cloud Range News Michele Lara Cloud Range News Michele Lara

With a Two-Year Revenue Growth of 411%, Cloud Range Ranked No. 44 on Inc. Magazine’s List of Fastest-Growing Private Companies in the Southeast Region

Cloud Range, the industry’s leading cyber range solution to reduce exposure to cyber risk across the organization, today announced that it has been ranked No. 44 on the fourth annual Inc. 5000 Regionals: Southeast list due to its 411% revenue growth over the last two years.

Read More
Unleashing Cyber Resilience: A Telecom Giant's SOC Transformation
Cyber Range Training Michele Lara Cyber Range Training Michele Lara

Unleashing Cyber Resilience: A Telecom Giant's SOC Transformation

Explore the transformative journey of a global telecommunications enterprise as it reshapes its Security Operations Center (SOC) into a resilient defense against cyber threats. Dive into the tangible results achieved, reduced noise for leadership, boosted team culture, and enhanced proficiency, and unlock the full narrative of adaptability and cyber readiness in this compelling case study.

Read More
The Value of Human-Centric Cybersecurity
Cyber Training Michele Lara Cyber Training Michele Lara

The Value of Human-Centric Cybersecurity

Gain insights into the importance of adopting a human-centric approach to cybersecurity and its impact on the capacity to thwart, identify, and address cyber threats. Explore the transformative potential of tailored training, security policies, and psychological elements in shaping your organization's security culture.

Read More
Equipping OT Cybersecurity Frontlines With Training and Tech with Cloud Range CEO Debbie Gordon
In the News Michele Lara In the News Michele Lara

Equipping OT Cybersecurity Frontlines With Training and Tech with Cloud Range CEO Debbie Gordon

Cloud Range CEO Debbie Gordon was recently a guest on the Velta Technology Industrial Cybersecurity Insider Podcast hosted by Craig Duckworth. They explored the importance of experiential learning in the realm of cybersecurity, addressing issues related to talent shortages and emphasizing the essential nature of ongoing, hands-on training.

Read More
Speeding Discovery of a Cyber Attack
Cyber Training Michele Lara Cyber Training Michele Lara

Speeding Discovery of a Cyber Attack

The landscape of cyber attacks is evolving, increasing in complexity, frequency, and associated costs. Explore the most effective strategies for expediting cyber attack detection through a proficient SOC team, understand the efficacy of this approach, discover leading detection tools, and recognize the risks associated with delayed detection.

Read More