We demonstrate how computer-based simulations could support cyber stress testing exercises through a three-step framework. First, cyber-attack scenarios are designed to target the systemic nodes of a ...
Late last year, an attacker known as "Matrix" orchestrated a large-scale distributed denial-of-service (DDoS) attack by exploiting vulnerabilities in Internet of Things (IoT) devices. By leveraging ...
CSO took part as a media advisor in a tabletop exercise that put CISOs and senior security leaders against one another in a red team vs. blue team ransomware scenario involving a water utility.