Cyber Range: Who, What, When, Where, How and Why?

What works in training students to protect enterprises from data breaches? How can experienced cyberpros practice defending their networks from emerging cyberthreats? Where are the right tools, effective processes and hands-on techniques combined to simulate real-world challenges faced from hackers? The answer may be at a cyber range near you. Here’s why the trend is … Continue reading Cyber Range: Who, What, When, Where, How and Why?

Cyber threat ‘coming at us from all sides’

“We’re worried—at the FBI and with our partners—about a wider range of threat actors, from multi-national cyber syndicates and insider threats to … Wray delivered the keynote address at BCCS 2018, a daylong event that brought together academicians, private industry, and law enforcement to …

Detection dogs take a bite out of cybercrime

In an effort to derail the dark web-world of kiddie porn, the newest member of the F.B.I. and law enforcement task force, the Electronic Device Detection K-9, was … Just recently in Essex, U.K., FBI-trained cyber dogs are being successfully used by British police to help round up and punish pedophiles.

IACP Conference