DojoLIVE! produces weekly live video broadcasts intended to be a source of inspiration, insights, and knowledge for the software development community throughout the world. The Cyber Warfare Games details Cyber Warfare and Contextualizing Neural Transmission in the Brain to Macro Functions. Featuring Data Scientist, Jon Curran, and CTO, Lee Rossey, of SimSpace. Hosted by Kim Lantis, Edgar Hernandez, Jorge Hernandez and Carlos Ponce.
A startup called SimSpace is using cloud and virtualization technologies to mimic enormous networks in order to run security tests and training, including simulated attacks.
Sue Marquette Poremba of IT Business Edge spends a lot of time talking to cybersecurity experts. Usually, those conversations are based around a specific incident in the news or about the latest study their company conducted, but every so often, she is privy to a discussion about cybersecurity in general. One such discussion was with Lee Rossey, co-founder and CTO of SimSpace.
SimSpace CEO William “Hutch” Hutchison was selected by the Massachusetts Employer Support to the Guard and Reserve (ESGR), a Department of Defense Agency, for it’s 2015 ESGR Patriot Award.
Boston-based SimSpace Corp CEO, William “Hutch” Hutchison, signed a Statement of Support for the Massachusetts Employer Support to the Guard and Reserve (ESGR), a Department of Defense Agency.
A group of hackers this week will try to invade networks run by city and state employees, attempting to steal data and wreak havoc on local utilities.
Ravello Systems and SimSpace Corp. are partnering on an easy to use cloud-based way to create simulated cyber attacks – and test the effectiveness of defenses, responses – and even IT skills.
Securing the enterprise like a castle of yore is bad for business, employees, and customers, so enterprises must protect data wherever it resides -- in sensors, mobile devices, silos, and networks.
Ravello and SimSpace’s On-Demand Cyber Ranges
Today’s cyber threat landscape necessitates that your organization base its approach to security on the assumption that the adversary is already inside your network. So how do we prepare your organization to take back your network and to protect your data?