Press & News

Leaders Eat Last

Culture rolls downhill. The values and standards modeled by an organization’s leadership will be emulated by those below them and set the tone for a company’s wellbeing. And setting that tone can take many forms.

read more

Aries Security and DEF CON: Leading The Charge

Every year, Aries Security is a proud sponsor of the Packet Hacking Village at DEF CON. We have been sponsoring the village since its inception in 2001, and the village provides us the opportunity to turn our cyber range, Capture The Packet, into a cybersecurity contest for the best hackers in the world.

read more

Cybersecurity: Train Like You Fight

Stay strong, stay fit

Much like physical fitness, cybersecurity skills weaken without regular training. In order to remain competent, whether doing offense or defense, professionals must have access to continual practice and education that reflects real-world scenarios and threats.

read more

Partner Spotlight: Redhorse and Aries Security

At Aries Security, we partner with companies and organizations that make it possible for us to fulfill client needs to the letter. We work in both classified and unclassified spaces, providing technology and services to military and government clients. The sensitive nature of some of this work means that we can’t always discuss the details of our projects with the public – but we can share this one.

read more

Military Feedback: In Their Own Words

We recently surveyed a group of trainees across multiple military service branches: Army, Air Force, Navy, Marine Corps, Air National Guard, and Marine Corps Reserve. Here are some of the insights we gained.

read more

Capture The Packet and USMC: Giving Back

At the end of April, our CEO, Brian Markus, received the below letter after a training event with the United States Marine Corps. We share it here with permission and deep gratitude. Supporting national security through promoting excellence in cybersecurity is part of Aries Security’s prime directive, and we are both humbled and thankful for this recognition.

read more

The Military Guide To Assessing Cybersecurity Preparedness

Cybersecurity professionals in the business world must keep their skills sharp in order to protect their organizations. But in the military, the stakes are much, much higher. For these cyber operators, being prepared – or lacking preparedness – can impact national security, physical safety, and even make the difference between life and death for troops in the field.

read more

12 Key Features of Top Cyber Range Solutions

There are quite a few companies who call their products “cyber ranges”. And there are plenty of vendors who will gladly tell you why their product is the best one of them all. But when the sales pitches are over and the glossy sales sheets are in the recycling bin, it can be challenging to narrow down the key features that separate the real cyber ranges from the posers.

read more

Options for Setting Up a Cyber Range: External Partners or In-House Administration

Welcome to the second part of our series on Options for Setting Up a Cyber Range. Last time, we talked about the first high-level choice involved in implementing a cyber range: whether to build your own or buy from a reputable third-party vendor. In this one, we’re looking at the second major consideration: is it better to outsource the administration of your cyber range, or to administer it in-house?

read more

Aries Security and CyberPatriot: Supporting Students

When we became aware that CyberPatriot teams were having trouble training, Aries stepped up to bridge the gap. In professional use, the Aries Online Cyber Range provides users access to virtual desktops to complete training exercises. We adapted this technology to allow students to access the CyberPatriot systems from anywhere, using only a web browser on any internet-connected device (phone, tablet, or computer). In addition, instructors were given the ability to remotely monitor students’ workstations in order to provide help and support as needed.

read more

Options for Setting Up a Cyber Range: Build vs. Buy

Setting up a cyber range can be overwhelming. At a high level, there are several decisions that will determine what type of implementation is best for your organization. The first major choice is whether to build your own cyber range or buy one from a reputable third-party vendor.
range.

read more

6 Risks of Not Conducting Continuous Cybersecurity Training

Cybersecurity training is vital. In a field where conditions on the ground change constantly, it is crucial that professionals are equipped with the knowledge and expertise they need to be effective in a crisis. Cybersecurity defenders must constantly maintain mission readiness to defend against coordinated networks of bad actors.

read more

What is a Cyber Range? A Definitive Guide and Definition

This three-part series is intended as a guide for organizations considering the use of a cyber range. There are several options, and numerous considerations which inform the decision-making process. This week, we’ll be looking at the first consideration: is it better for you to build a cyber range, or to buy one?

read more

Packet Hacking Village a Huge Hit at DEF CON!

Packet Hacking Village a Huge Hit at DEF CON!By the time this goes up, the DEF CON 28 Safe-Mode convention will have come and gone. We have another article up talking about getting the convention stood up, so here we want to talk about how our very own Packet Hacking...

read more

Capture The Packet 4.5.3 Is Now Live!

After nearly a year of user acceptance testing, our world-leading simulation platform for training cybersecurity professionals, Capture The Packet, is now available as a cloud-based offering.  This is in addition to the on-premises VM and portable appliance.

read more

Pin It on Pinterest