Press & News
Culture rolls downhill. The values and standards modeled by an organization’s leadership will be emulated by those below them and set the tone for a company’s wellbeing. And setting that tone can take many forms.
Every year, Aries Security is a proud sponsor of the Packet Hacking Village at DEF CON. We have been sponsoring the village since its inception in 2001, and the village provides us the opportunity to turn our cyber range, Capture The Packet, into a cybersecurity contest for the best hackers in the world.
Hacker-developed “Capture The Packet” technology set to collaborate with U.S. Navy to revolutionize how we train and evaluate our nation’s top cyberdefenders
Stay strong, stay fit
Much like physical fitness, cybersecurity skills weaken without regular training. In order to remain competent, whether doing offense or defense, professionals must have access to continual practice and education that reflects real-world scenarios and threats.
At Aries Security, we partner with companies and organizations that make it possible for us to fulfill client needs to the letter. We work in both classified and unclassified spaces, providing technology and services to military and government clients. The sensitive nature of some of this work means that we can’t always discuss the details of our projects with the public – but we can share this one.
We recently surveyed a group of trainees across multiple military service branches: Army, Air Force, Navy, Marine Corps, Air National Guard, and Marine Corps Reserve. Here are some of the insights we gained.
At the end of April, our CEO, Brian Markus, received the below letter after a training event with the United States Marine Corps. We share it here with permission and deep gratitude. Supporting national security through promoting excellence in cybersecurity is part of Aries Security’s prime directive, and we are both humbled and thankful for this recognition.
Cybersecurity professionals in the business world must keep their skills sharp in order to protect their organizations. But in the military, the stakes are much, much higher. For these cyber operators, being prepared – or lacking preparedness – can impact national security, physical safety, and even make the difference between life and death for troops in the field.
There are quite a few companies who call their products “cyber ranges”. And there are plenty of vendors who will gladly tell you why their product is the best one of them all. But when the sales pitches are over and the glossy sales sheets are in the recycling bin, it can be challenging to narrow down the key features that separate the real cyber ranges from the posers.
Welcome to the third and final part of our series on Options for Setting Up a Cyber Range. In this last article, we’re going to get into the weeds and explore the detailed considerations that your organization may encounter in the selection of a cyber range.
Welcome to the second part of our series on Options for Setting Up a Cyber Range. Last time, we talked about the first high-level choice involved in implementing a cyber range: whether to build your own or buy from a reputable third-party vendor. In this one, we’re looking at the second major consideration: is it better to outsource the administration of your cyber range, or to administer it in-house?
When we became aware that CyberPatriot teams were having trouble training, Aries stepped up to bridge the gap. In professional use, the Aries Online Cyber Range provides users access to virtual desktops to complete training exercises. We adapted this technology to allow students to access the CyberPatriot systems from anywhere, using only a web browser on any internet-connected device (phone, tablet, or computer). In addition, instructors were given the ability to remotely monitor students’ workstations in order to provide help and support as needed.
Setting up a cyber range can be overwhelming. At a high level, there are several decisions that will determine what type of implementation is best for your organization. The first major choice is whether to build your own cyber range or buy one from a reputable third-party vendor.
If organizations want to survive and thrive, investing in cybersecurity training isn’t just a good idea. It’s mission critical.
Cybersecurity training is vital. In a field where conditions on the ground change constantly, it is crucial that professionals are equipped with the knowledge and expertise they need to be effective in a crisis. Cybersecurity defenders must constantly maintain mission readiness to defend against coordinated networks of bad actors.
This three-part series is intended as a guide for organizations considering the use of a cyber range. There are several options, and numerous considerations which inform the decision-making process. This week, we’ll be looking at the first consideration: is it better for you to build a cyber range, or to buy one?
In even more news on the DEF CON front, we are celebrating our integration with AWS to bring Capture The Packet, in all it’s forms, to the world during the conference!
Aries Security and the Wall of Sheep Proud to Help DEF CON go VirtualThe Wall of Sheep has a long history of being the outreach arm of Aries Security. Through this amazing group of staff, members of the community and collaborators, we have managed to bring training to...
Packet Hacking Village a Huge Hit at DEF CON!By the time this goes up, the DEF CON 28 Safe-Mode convention will have come and gone. We have another article up talking about getting the convention stood up, so here we want to talk about how our very own Packet Hacking...
After nearly a year of user acceptance testing, our world-leading simulation platform for training cybersecurity professionals, Capture The Packet, is now available as a cloud-based offering. This is in addition to the on-premises VM and portable appliance.