Leaders Eat Last

Leaders Eat Last

Leaders Eat Last Leaders eat last. That’s a saying that embodies the philosophy of servant leadership, and it’s the mindset that guides our company culture at Aries Security. At DEF CON 29, Aries Security held an appreciation event on Saturday evening for our Packet...
Aries Security and DEF CON: Leading The Charge

Aries Security and DEF CON: Leading The Charge

Aries Security and DEF CON: Leading The Charge Nearly a decade ago, the Packet Hacking Village at DEF CON was founded.And every year, Aries Security’s team combined with amazing volunteers from the hacking community helps provide education and training at no...
Aries Security Bringing Hacker Expertise to the Navy

Aries Security Bringing Hacker Expertise to the Navy

Aries Security Bringing Hacker Expertise to the Navy Hacker-developed “Capture The Packet” technology set to collaborate with U.S. Navy to revolutionize how we train and evaluate our nation’s top cyberdefenders This month, Aries Security founder Brian Markus announced...
Cybersecurity: Train Like You Fight

Cybersecurity: Train Like You Fight

Cybersecurity: Train Like You Fight A recent article by Security Magazine highlighted the hazards of relying on one-time learning to prepare cybersecurity professionals. The author cites research to support the idea that, rather than focusing on annual training...
Partner Spotlight: Redhorse and Aries Security

Partner Spotlight: Redhorse and Aries Security

Partner Spotlight: Redhorse and Aries Security At Aries Security, we partner with companies and organizations that make it possible for us to fulfill client needs to the letter. We work in both classified and unclassified spaces, providing technology and services to...
Military Feedback: In Their Own Words

Military Feedback: In Their Own Words

Military Feedback: In Their Own Words As part of our work, Aries Security regularly conducts training sessions for members of the United States armed forces. Our cyber range has the capability to provide specific, tailored training to meet military Joint Qualification...
Capture The Packet and USMC: Giving Back

Capture The Packet and USMC: Giving Back

Capture The Packet and USMC: Giving Back At the end of April, our CEO, Brian Markus, received the below letter after a training event with the United States Marine Corps. We share it here with permission and deep gratitude. Supporting national security through...
The Military Guide To Assessing Cybersecurity Preparedness

The Military Guide To Assessing Cybersecurity Preparedness

The Military Guide To Assessing Cybersecurity Preparedness Cybersecurity professionals in the business world must keep their skills sharp in order to protect their organizations. But in the military, the stakes are much, much higher. For these cyber operators, being...
12 Key Features of Top Cyber Range Solutions

12 Key Features of Top Cyber Range Solutions

12 Key Features of Top Cyber Range Solutions There are quite a few companies who call their products “cyber ranges”. And there are plenty of vendors who will gladly tell you why their product is the best one of them all. But when the sales pitches are over...
Options for Setting Up a Cyber Range: Organizational Considerations

Options for Setting Up a Cyber Range: Organizational Considerations

Options for Setting Up a Cyber Range: Organizational Considerations Welcome to the third and final part of our series on Options for Setting Up a Cyber Range. In the first part, we discussed whether it’s better to build your own range or purchase one from an outside...

Pin It on Pinterest