Predictions for Cyber Security in 2020

Reading Time: 5 minutes The dynamic world of cyber security is prompting a new shift in focus for security execs and frontline defenders as we head into a new year in 2020. Given the rapid pace by which enterprises have adopted Cloud computing services to improve operations, the frequency of threats and attack methods, and the widening skills gap […]

Rethinking cyber learning—consider gamification

Reading Time: 1 minute This post originally appeared on Microsoft’s Security Blog, authored by Mark McIntyre, Executive Security Advisor, Enterprise Cybersecurity Group

Cyber Monday and Black Friday Cyber Security Safety Tips to Prevent Holiday Hacks  

Reading Time: 3 minutes If you’re anything like me, you get really excited when the holidays roll around. The music is cheerful (the Hallmark Channel is on 24/7–high five!), the fireplace is roaring, and I can curl up with my blanket and mobile phone to SHOP ONLINE (of course). Ah, the spirit of the holidays…But the bah humbug part […]

Living our Mission Blog Series: How Tony Hammerling, Curriculum Developer, Orchestrates a Symphony of Cyber Learning at Circadence

Reading Time: 3 minutes Circadence’s Curriculum Developer Tony Hammerling wasn’t always interested in a career in cyber—but he was certainly made for it. In fact, he initially wanted to be a musician! While his musical talents didn’t pan out for him early in his career, he quickly learned how to create unique harmonies using computers instead of instruments…After joining […]

8 Tips to Keep Your Small Business Cyber Safe this Holiday Season

Reading Time: 3 minutes The holiday season is a time of giving, however, for hackers it can be a time of swindling. We are all susceptible to cyberattacks, but small businesses can hurt the most from the fall out. With limited staff numbers, small IT departments (if any at all), and no money allocated toward remediation, it is of […]

Operation Gratitude: 5 Reasons to Give Thanks for Cyber Security

Reading Time: 3 minutes With daily breaches impacting business operations and security, it’s easy to forget about the good ways that cyber security keeps us safe behind the scenes. This holiday season, we’re giving thanks to cyber security and all that it does to make our lives easier and more secure with what we’re calling Operation Gratitude (inspired by […]

28 Bits and Bytes About Cybersecurity Careers You (Probably) Didn’t Know

Reading Time: 3 minutes According to a report from ProtectWise and Enterprise Strategy Group, only 9% of millennials said they are interested in pursuing a cybersecurity career at some point in their lives. Much of the reasoning behind the low percentage of cybersecurity professionals is due to lack of awareness around cyber. Many are aware of other computer-related fields […]

Will Artificial Intelligence Replace Cyber Security Jobs?

Reading Time: 2 minutes The cyber security workforce gap continues to grow, and the availability of qualified cyber professionals is predicted to decrease in the coming years. In fact, a Cyber Security Workforce Study from the International Information System Security Certification Consortium predicts a shortfall of 1.8 million cyber security workers by 2022. Some resources claim upwards of 3.5 […]

Why Cyber Security is Important for Higher Education Institutions

Reading Time: 3 minutes It might surprise you to know that the education industry is a prime target for malicious hackers. While threats in this sector are on the rise, many education institutions are not prepared for a cyber attack nor do they know how to recover from one. In fact, there were 122 cyber attacks last year at […]

Trick or Cyber Treat? How Quickly Hackers Use Your Information

Reading Time: 2 minutes We’re getting in the Halloween spirit (with a cyber security spin of course)! We started wondering about the mysterious (or not-so-mysterious) world of hacking.  We wondered just how frightfully easy it might be to gather intel from social platforms with minimal prerequisite knowledge. To that end, we did a little experiment in an attempt to […]

Living our Mission Blog Series: Programming Innovation in Orion, Thanks to Raeschel Reed, Circadence Software Engineer

Reading Time: 2 minutes There’s never a dull moment at work for Circadence Software Engineer Raeschel Reed. Between learning ways to use new technology, improving coding techniques, and operationalizing cyber innovations, Raeschel is a critical part to the success of the company’s product suite. She currently works on Orion, a curriculum development application that allows learning coordinators or security […]

Living our Mission Blog Series: Hitting a Home Run with Circadence’s Security Management, thanks to TS Reed, Cybersecurity Engineer

Reading Time: 3 minutes The journey to cybersecurity engineer has been an exciting one for Circadence’s TS Reed. The former baseball pro turned security tech expert found his passion for problem solving at Circadence. After completing an undergraduate degree in criminology at Cal State Northridge, he pursued a master’s degree in mechanical engineering at CSUN and then a master’s […]

Living our Mission Blog Series: Supporting Cyber Red Teams, with Consultations and Pen Testing from Josiah Bryan

Reading Time: 2 minutes While Circadence is proud to be a pioneer that has developed innovative cyber learning products to strengthen readiness at all levels of business, there’s one professional area at Circadence that doesn’t tend to get the limelight, until now. Meet Josiah Bryan, principle Security Architect for Circadence’s security consultation services, aptly called Advanced Red Team Intrusion […]

How to stay safe from social engineering attacks

Reading Time: 4 minutes What is social engineering and why does it matter? In the context of information security, it is a hacking tactic designed to psychologically manipulate or “trick” a person into performing actions or divulging confidential information. Social engineering threats are a wildly popular way for cybercriminals to get access to money or damage a company’s reputation. […]

Exclaim “Cyber for All!” During National Cyber Security Awareness Month

Reading Time: 5 minutes Happy National Cyber Security Awareness Month! We all know that cyber security isn’t just a month-long focus area for businesses and individuals—but this month, we are grateful for the collaborative effort between government entity Department of Homeland Security and the National Cyber Security Alliance that together, place a lens on cyber (as an industry, strategy, […]

Why Alternatives to Traditional Cyber Training Are Needed Immediately

Reading Time: 4 minutes Are you looking for a more effective, cost-conscious cyber training tool that actually teaches competencies and cyber skills? We’ve been there. Let us share our perspective on the top cyber training alternatives to complement or supplement your organization’s current training efforts. Cyber training has evolved over the years but not at pace with the rapid […]

Help Wanted: Combating the Cyber Skills Gap

Reading Time: 4 minutes Recent news headlines are clear on one thing: there is a massive shortage of cybersecurity experts in the industry. Cyberattacks are permeating every commercial and government sector yet the talent pool of defenders can’t keep pace.

Living Our Mission: Embracing the Art of Gamification with Hector Robles, Lead Game Designer at Circadence

Reading Time: 4 minutes If there’s anyone who truly embodies the art of gamification, Hector Robles name just might top that list. As a lead game designer at Circadence, Hector works closely with the company’s content and curriculum departments to take complex cyber concepts and learning paths and artistically weaving them into fun cyber games that make learning desirable. […]

Living Our Mission Blog Series: Building Hyper-Scalable Cyber Training Experiences with Randy Thornton, Enterprise Architect at Circadence

Reading Time: 3 minutes A newly minted Engineering Fellow, Randy Thornton has dedicated his craft to software development for over 30 years. His passion for learning and using new technologies is evident in Circadence’s cyber range platform, Project AresÒ. Randy joined Circadence in 2005 when the company was selling its WAN Optimization product, MVOÔ. His background in scientific computing […]

Living Our Mission: Learning is Built into Project Ares, Thanks to Victoria Bowen, Instructional Designer at Circadence

Reading Time: 3 minutes Victoria Bowen has worked in the instructional design field for about 35 years – primarily developing e-learning with a smattering of web development, SharePoint development, and Learning Management System administration. She holds an undergrad degree is in psychology, a master’s in special education, and doctorate in curriculum, instruction, and supervision with emphasis on instructional design.  […]

Living our Mission: Creating Authentic Cyber Training and Learning Environments Inspired by Real-World Experience: Todd Humes, Sr. Mission Designer

Reading Time: 2 minutes Bringing his Air Force and military security engineering background to use, Senior Mission Designer Todd Humes understands what it takes to defend networks from adversaries. Prior to Circadence, he served in various government security roles including as a Systems Security Engineer and Systems Administrator and on the commercial side as a Director of Network Defense […]

Cyber Security and the Baby Boomer, Gen X Populations

Reading Time: 2 minutes We all have someone in our lives who isn’t tech-savvy.  They don’t know how to convert a word doc into a PDF, or they try to do a Google search on Facebook, or they seem to struggle with the ‘simple’ act of text messaging. These are not uncommon missteps when using smart devices for people who didn’t grow up with Siri ® (let alone the Internet!) at their fingertips. While these mistakes seem harmless or even […]

DeepFake: The Deeply Disturbing Implications Behind This New Technology

Reading Time: 3 minutes DeepFake is a term you may have heard lately. The term is a combination of “deep learning” and “fake news”. Deep learning is a class of machine learning algorithms that impact image processing, and fake news is just that – deliberate misinformation spread through news outlets or social media. Essentially, DeepFake is a process by […]

When cyber security meets machine learning

Reading Time: 2 minutes What happens when cyber security and machine learning work together? The results are pretty positive. Many technologies are leveraging machine learning in cyber security functions nowadays in order to automate and augment their cyber workforce. How? Most recently in training and skill building. Machine learning helps emulate human cognition (e.g. learning based on experiences and […]

How Cyber Security Can Be Improved

Reading Time: 5 minutes Every day we get more interconnected and that naturally widens the threat surface for cybercriminals. In order to protect vulnerabilities and keep pace with hacker methods, security – and non-security professionals must understand how to protect themselves (and their companies). And that involves looking for new ways to improve cyber security. To start, we believe […]

Living our Mission Blog Series #3: New Learning Curriculum in Project Ares 3.6.4

Reading Time: 3 minutes We’ve made several new updates to our gamified cyber learning platform Project Ares. We are releasing new battle room and mission cyber security exercises for professionals to continue training and honing skills and competency and have optimized some aspects of performance to make the learning experience smoother. New Missions and Battle Rooms To ensure professionals […]

Targeted Cybercrime on the Rise

Reading Time: 3 minutes Targeted attacks against particular groups or entities are on the rise this year. Instead of a “spray and pray” approach, malicious hackers are getting particular about who and what they attack and how for maximum accuracy. Why? The right ransomware attack on the right data set to the right group of people can yield more […]

Good Bots and Bad Bots: How to Tell the Difference to Stay Cyber Safe

Reading Time: 2 minutes You may have heard or read the term “bot” in the context of cyber security. Normally we hear this word in the wake of a cyberattack and relate it to breaches in computer or network security. While there are certainly bad bots, there are good bots too! So what exactly is a bot, how can […]

Ransomware – The Attack Du Jour!

Reading Time: 3 minutes Ransomware is gaining traction among hackers; emboldened by financial success and anonymity using cryptocurrencies. In fact, ransomware is now considered a tried and true cyberattack technique, with attacks spreading among small and medium-sized businesses, cities and county governments. Coveware’s recent 2019 Q1 Ransomware Report notes: Ransoms have increased by an average of 89% over Q1 […]

Cyber Security and the LGBTQIA Community

Reading Time: 2 minutes While most of us recognize the inherent vulnerabilities of putting our personal information online, we may not think about how marginalized communities are at even greater risk of malicious attacks on the internet. The LGBTQIA (lesbian, gay, bi-sexual, transgender, queer, intersex, and asexual) community certainly understands the ramifications of sharing their lifestyles on the web, […]

Spotlight: Cyber Security Readiness for the Electricity and Energy Industries

Reading Time: 2 minutes When your power goes out, you recognize just how many things you use every day rely on energy. From phones to WiFi to air conditioning and heat, our homes and offices almost entirely rest on this silo of critical infrastructure. While we may not think of the energy sector as being a significant cyber vulnerability […]

Cyber Attacks and Risk Mitigation in Critical Infrastructure

Reading Time: 4 minutes Critical infrastructure is a term used by the government to describe assets that are essential for the functioning of a society and economy (think oil and gas, water, electricity, telecommunication, etc.). According to the Department of Homeland Security, there are 16 sectors of critical infrastructure. In the past few years, we’ve seen attacks on departments […]

Kickstarting Your Cyber Security Career Path

Reading Time: 3 minutes Jumpstarting a new cyber security career path can feel like a daunting initiative, however, it may be more attainable than you think. By utilizing online cyber resources and persistent learning exercises, you can start learning everything you need to know to understand career options and land your dream job. Virtual machines and digital libraries are […]

Microsoft Azure Government Secret Helps Enhance Cyber Training

Reading Time: 2 minutes Across the board there’s been a push from a policy perspective to get into secure cloud environments that provide organizations with the on-demand and protected availability that they need to improve business processes. Azure Government Secret is a cloud solution that delivers comprehensive and mission-enabling cloud services to US Federal Civilian, Department of Defense (DoD), Intelligence Community (IC), […]

Girl Scout Troop Visits Circadence to Earn Cyber Security Badges

Reading Time: 3 minutes Introducing girls to the world of cyber security and empowering their access to this STEM discipline is incredibly important to Circadence as we advocate for a cyber workforce with diversified thinking and problem-solving perspectives to keep pace with today’s adversaries. In mid-May, Circadence was honored to host 12 Brownies from a local Girl Scout troop […]

How to Launch a Cyber Security Career

Reading Time: 5 minutes Preparing for a cyber security career is more enjoyable than you may think! The technical challenge, problem-solving, constant change (you’re never bored!), and continuous learning opportunities are positive experiences one can have when entering the field of cyber security. For any interested student or autodidactic, a cyber career path may seem a little daunting. But […]

The Future of Cyber Security in the Wake of Standardized Workforce Development

Reading Time: 4 minutes The implications of the Executive Order on America’s Cybersecurity Workforce and what it means for cyber workforce development going forward The White House recently issued the Executive Order on America’s Cyber Security Workforce. This forward-looking executive order aims to close the cyber security skills gap and increase the number of cybersecurity professionals working in the […]

Nichols College Students Spearhead Cyber Security Education for the Entire Campus 

Reading Time: 3 minutes Policy makers are now prioritizing data security over talent, efficiency and controlling costs. As students growing up and being educated in the digital age, we are just starting to understand the importance of cyber security to individuals and their companies. Taking part in a Research Associate Internship on campus at Nichols College, our eyes have […]

Diversity in Cyber Security: Why It’s Important and How To Integrate It

Reading Time: 3 minutes You may have heard that the cybersecurity skills gap is widening, and that there is a massive shortage of cyber professionals today. In fact, Cybersecurity Ventures predicts that there will be up to 3.5 million job openings in the field by 2021. In spite of the growing need for people in cyber, women continue to […]

Healthcare Cybersecurity: In Critical Condition

Reading Time: 2 minutes The digitalization of healthcare communication has greatly impacted how healthcare professionals use medical devices, perform patient care, and conduct internal operations. Electronic health record (EHR) mandates and widespread adoption of mobile devices has accelerated at such a rapid pace, healthcare cybersecurity companies are making mistakes that are inviting malicious hackers inside. Unfortunately, the healthcare industry […]

Cyber Ranges and How They Improve Security Training

Reading Time: 3 minutes WHAT ARE CYBER RANGES? Cyber ranges were initially developed for government entities looking to better train their workforce with new skills and techniques. Cyber range providers like us deliver representations of actual networks, systems, and tools for novice and seasoned cyber professionals to safely train in virtual, secure environments without compromising the safety of their own network infrastructure. […]

Obstacles and Opportunities in Cybersecurity Regulation and Legislation

Reading Time: 3 minutes As our world becomes increasingly dependent on the internet, more safeguards must be put in place in order to keep our information and services we rely on secure. In the last few years, we have seen an increase in regulations and legislation passed to uphold these safeguards, but it is unclear how much this has […]

The Internet of Things Ushers in a New Wave of Cybersecurity Needs

Reading Time: 3 minutes The internet has changed rapidly since its inception in 1983. The way we communicate, consume news and media, shop, and collect data are just a few examples of the way the internet has changed the world. A term you may have heard crop up in recent years is IoT, or The Internet of Things. IoT […]

A New Perspective: Changing How We Think About Cybersecurity Training

Reading Time: 4 minutes What if someone told you that there was a new way to commute to work in the morning? A way that was more efficient than taking the highways or backroads to avoid traffic – a way that would allow you to save time, headaches and the dangers of driving altogether…you’d be interested, right? Maybe a […]

Are you living the CISO nightmare? Five Cyber Concerns Keeping Them Up at Night

Reading Time: 4 minutes What keeps CISOs up at night? Is it the looming concern of a threat? The uncertainty of cloud security? Wondering if you have enough cyber pros on the frontlines to defend and protect? Maybe it’s all three –and more. CISOs are carrying a lot of security responsibility on their shoulders, all while trying to make […]

On the Move: Cyber Attacks on the Transportation Systems

Reading Time: 3 minutes Everything is on the move. People. Agriculture. Water. Power. Materials ranging from home goods to hazardous waste all flow through a massively complex, public/private, interconnected – and increasingly automated – hive of vehicles and transport systems. According to the Department of Homeland Security: More than 19,000 airports with 780,000 commercial flights a month 361 ports and […]

Hope for Cybersecurity: Cyber Teaching Challenges & New Horizons for Cyber Learning

Reading Time: 3 minutes The statistics are dismal. An estimated 3.5 million unfilled cyber positions by 2021 and today, we have over 300,000 openings in the U.S. alone. According to a New York Times article, “filling those jobs would mean increasing the country’s current cybersecurity workforce of 715,000 people by more than 40 percent,” according to data presented at the National […]

Guest Blog: Embracing Immersive, Gamified Cybersecurity Learning, Featuring Divergence Academy

Reading Time: 2 minutes What is immersive, gamified cybersecurity learning? The term was originally coined in 2002 by a British computer programmer named Nick Pelling. The term hit the mainstream when a location-sharing service called Foursquare emerged in 2009, employing gamification elements like points, badges, and “mayorships” to motivate people to use their mobile app to “check in” to places they visited.  The term hit buzzword fame in 2011 when […]

Guest Blog: Reimagining Cyber Learning for Students, Featuring Divergence Academy

Reading Time: 3 minutes   It’s one thing to talk about the importance of teaching cybersecurity in an engaging way, and another thing to actually do it. Divergence Academy is proud to partner with Circadence to reimagine how cybersecurity is taught to current and aspiring professionals. About Divergence Academy Divergence Academy is an education institution creating adaptive learning solutions […]

Inside inCyt: The Benefits of Gamified Cybersecurity Learning (An Interview with Cassie Brubaker)

Reading Time: 4 minutes Here at Circadence, we are dedicated to taking cybersecurity learning to the next level. We do this through gamification that is accessible to all ages and ranges of knowledge on the subject. Our own Cassie Brubaker, co-creative director on our security awareness mobile app inCyt™, helped us understand the differences between learning and training, and […]

Ten Reasons to Check Out San Francisco while at RSA

Reading Time: 3 minutes Your definitive guide to de-compressing from the tradeshow chaos.
Exhibiting at and attending a tradeshow can be stressful. Packing, getting to your flight on time and finding your way in a “new” city are all trying.

Guest Blog: Taking Cybersecurity Learning to a Whole New Level

Reading Time: 2 minutes Last week I was lucky enough to be able to attend Circadence’s Cyber Learning Tour at the Microsoft Technology Center in Chicago.  This event was hosted by Laura Lee, VP of Rapid Prototyping,  and one of the lead creators of the Project Ares training platform.

A Call to Diversify the Cybersecurity Workforce

Reading Time: 3 minutes You’ve read about it, know it well, and can probably instantaneously identify one of today’s top cyber crises: the cybersecurity skills gap. It’s putting enterprises, governments and academic institutions at greater risk than ever because we don’t have enough professionals to mitigate, defend, and analyze incoming attacks and vulnerabilities.

Making Cybersecurity BETTER: Dan Manson to Speak at RSA 2019

Reading Time: 2 minutes With the New Year in full swing, we are resolved to improve not only our own products to meet industry shifts but helping improve cyber professional’s skill sets against evolving threats.

What We’ve Learned from the Evolving IT Landscape and Where Cyber Security is Headed in 2019

Reading Time: 4 minutes The new year is always a good time for reflection. At Circadence, we look back on the dynamic IT landscape and ever-evolving threats to understand where CISOs and security leaders can direct their attention in 2019 and prioritize new security practices.

Finding the needle in the cybersecurity haystack: Why gamification is the answer you’ve been looking for

Reading Time: 2 minutes To say we’re on an upward trajectory in the cybersecurity space would be an understatement. Cyber threats are increasing. Organizational spending is increasing.

Circadence Takes “A Different Look at Cybersecurity” on the Road

Reading Time: 1 minute In partnership with Sirius Computer Solutions, Snowflake Computing, and Puppet software, Circadence is pleased to participate in the roadshow series,  “A Different Look at Cybersecurity.”

Artificial Intelligence and Learning Through Robotics: An Interview with Circadence CTO Bradley Hayes

Reading Time: 5 minutes We sat down with Circadence’s own Chief Technology Officer, Brad Hayes, to delve deeper into the meaning of AI and machine learning as it relates to the cybersecurity field, to discuss how robotics inform best cybersecurity practices, and to learn about new developments that are shaping the future of the field.

Cybersecurity & Artificial Intelligence Trends from 2018

Reading Time: 2 minutes A study conducted by SailPoint reported that nearly 75% of employees engage in password re-use across accounts, as opposed to just over half four years ago. Nearly half of people surveyed admitted to sharing passwords across personal and work accounts. Part of this is being driven by employees seeing IT practices as inconvenient, as they seek circumvention in favor of personal efficiency.

Utilizing Cyber Range Learning in Academia

Reading Time: 2 minutes Cyber ranges are virtual learning environments used for cyber warfare skills development.  A cyber range offers hands-on learning opportunities for cybersecurity professionals by marrying traditional classroom concepts with more ‘sticky’ experiential learning techniques.

Living Our Mission Blog Series #2: New Developments for Project Ares 3.6

Reading Time: 3 minutes From new training content to Intelligent Cloud-based hosting options, our immersive, gamified Project Ares cybersecurity learning platform continues to evolve to meet the changing needs of our customers.

2019 Cybersecurity Predictions

Reading Time: 3 minutes Well, it’s safe to say that 2018 for the cybersecurity industry has been a little doom and gloom. And rightly so. More than 3.5 million unfilled job positions expected by 2021, 90 percent of cyberattacks caused by human error, and what we thought were once effective learning methods prove to only yield a 5 percent information retention rate.

Oil and Gas Cyber Security: Understanding Risks, Consequences, and Proactive Measures

Reading Time: 4 minutes The oil and gas sector is vulnerable to cyberattacks as it adopts digital means by which to control communications that help power energy production and distribution. Daily activities that we often take for granted are powered by the energy from oil and gas including everyday cooking, heating/cooling, communication, and use of electronic devices and appliances.

Close the Cybersecurity Workforce Gap with Apprenticeships, Internships, and Other Alternative Pathways

Reading Time: 4 minutes We’ve all heard by now that the cyber workforce gap has reached a level of desperation that puts all of us, and our country, at risk. It’s time we start moving the conversation away from the problem and towards innovative solutions.
To truly narrow this cyber workforce gap, it’s crucial to solicit the collaboration and support of the “golden trifecta” – academia, commercial industries, and government.

Modernizing Cyber Ranges

Reading Time: 3 minutes Cyber ranges were initially developed for government entities looking to better train their workforce with new skills and techniques. Cyber ranges provide representations of actual networks, systems, and tools for novice and seasoned cyber professionals to safely train in virtual environments without compromising the safety and security of their own networks.

Penetration Testing Challenges and Solutions

Reading Time: 3 minutes It’s one of the most direct and proactive cybersecurity activities organizations can do to protect themselves from an attack—penetration testing. Also known as ethical hacking, it involves legally breaking into computers to test an organization’s defenses.

Keeping Critical Infrastructure Strong and Secure

Reading Time: 2 minutes November is Critical Infrastructure Security and Resilience Month, a nationwide effort to raise awareness and reaffirm the commitment to protect our Nation’s critical infrastructure.  Circadence’s mission is to build awareness about how next-generation cybersecurity education and training can improve cyber preparedness.

A Rising Tide Lifts all Boats: Celebrating National Cybersecurity Awareness Month

Reading Time: 3 minutes National Cybersecurity Awareness Month (NCAM) in October reminds us of the importance of being safer online, in both our professional and personal lives. Easier said than done, eh? Who’s to say the majority of us even know what makes us “safer” online, or for that matter what makes us vulnerable or should raise a red flag?

How To Tell If Your Cybersecurity Strategy Is Prone to a Cyberattack

Reading Time: 2 minutes What does your current InfoSec environment look like? Are teams prepared to tackle evolving threats? Is your cybersecurity strategy aligned with business objectives? Do you and your team undergo regular training to stay ahead of hackers? If you’re not sure, this blog is for you.

Living Our Mission Blog Series: New Developments for Project Ares

Reading Time: 2 minutes The only constant in cybersecurity is change. To best serve our customers’ needs and equip them with the latest technology, tools, and best practices that help them successfully combat evolving threats, Circadence regularly updates its cybersecurity solutions.

Cultivating the Next Generation of Cyber Professionals: Recapping Summer Internship Projects

Reading Time: 3 minutes Circadence® is proud to live out its mission to continuously educate and upskill the next generation of cyber professionals. We had the pleasure of hosting several interns over the Summer season who showed us firsthand the promise and potential they have for the industry.

Bridging the Cybersecurity Skills Gap with Artificial Intelligence

Reading Time: 3 minutes You know it and we know it. We cannot train our way out of the widening cybersecurity skills gap (expected to reach 3.5 million by 2021).

3 Ways to Prevent Cyber Security Election Interference

Reading Time: 4 minutes Since the 2016 election, numerous reports have cited concerns of vulnerabilities in the voting ecosystem, detailing attempts by nation states such as Russia to exploit election cybersecurity systems with pervasive cyberattacks.

Celebrate “National Cybersecurity Awareness Month” Year-Round

Reading Time: 3 minutes National Cybersecurity Awareness Month (NCAM) in October reminds us of the importance of being safer online in both our professional and personal lives. By employing fundamental cybersecurity best practices, ALL professionals from the C-Suite to the Administrator can better safeguard against ongoing threats infiltrating and exploiting systems and data every day.  

CISOs, Strengthen Your Cybersecurity Posture with These Resources

Reading Time: 3 minutes There is a hacker attack every 39 seconds. The average cost of a data breach in 2020 is expected to exceed $150 million. And by 2021, there will be more than 3.5 million unfilled cybersecurity jobs worldwide. No enterprise is safe from an attack.  

Learn the Three A’s for Enhanced Cyber Awareness

Reading Time: 2 minutes We’re constantly learning at Circadence. Learning what’s new and effective in cyber training. Understanding what our customers need and want in a cyber training platform. Discovering the issues that still keep them up at night.

Understanding the Dark Web

Reading Time: 3 minutes If you are familiar with recent news reports about security incidents and threats, you’ve probably heard of the ‘dark web’ or the ‘darknet.’ In fact, you don’t even need to pay attention to the news. TV shows, movies and even social networking sites will introduce the terms to you.

Game On: The Benefits of Active, Gamified Learning in Cyber Training

Reading Time: 3 minutes Cyber training has been conducted in the same way for years, comprised of traditional, classroom-style settings complete with a teacher lecturing and passive listeners. 

Game of Titans Cyber Challenge Attracts Top Professionals, Raises Awareness of Gamified Training and Assessment Solutions

Reading Time: 1 minute We hosted our first-ever “Game of Titans” Cybersecurity Challenge in Las Vegas recently, gathering security professionals together to compete on our Project Ares® cybersecurity platform for a chance to win several prizes.

Recapping Jack Voltaic 2.0 Cyber Research Project: A Q&A with Laura Lee

Reading Time: 3 minutes Late last week, Circadence® participated in the Jack Voltaic 2.0 Cyber Research Project held in Houston, Texas. The event was described as a “bottom-up approach to critical infrastructure resilience,” where the City of Houston, in partnership with AECOM and the Army Cyber Institute (ACI) gathered with critical infrastructure partners to study cybersecurity preparedness gaps.  

DevSecOps: The Benefits of Security and DevOps Working Together

Reading Time: 2 minutes For years, security professionals, including myself, have advocated for security to be part of the development process. Recently, development has been undergoing a big shift as it becomes a more integrated process.

Circadence’s Laura Lee Mentors Young Women at Cybersecurity Badge Program Launch Event for Girl Scouts in Partnership with Palo Alto Networks

Reading Time: 2 minutes Our own Laura Lee, executive vice president of rapid prototyping, recently mentored young girls at a Girl Scouts event on Wednesday, June 27, that celebrated the launch of a new cybersecurity badge program.

The program is the brainchild and joint partnership between Palo Alto Networks and Girl Scouts of the USA (GSUSA)

Play, Watch, Experience: Circadence to Host First-Ever “Game of Titans” Cyber Challenge in Las Vegas

Reading Time: 2 minutes As the New York Times points out, “Video games are beginning their takeover of the real world,” and with the popularity of Fortnite and other events gaining traction, Circadence® is jumping on the voyeuristic video game bandwagon hosting its first “Game of Titans” Cyber Challenge–a unique event that will demonstrate the power of its immersive, online cybersecurity training platform Project Ares®.

The “Game of Titans” competition is one of THREE ways cybersecurity warriors can experience the power of gamification within cybersecurity training in Las Vegas from August 6 through August 9.

GUIs Are Evil

Reading Time: 3 minutes Graphical User Interfaces (GUIs) are evil. Or in the words of a friend of mine – “the work of the devil.” I know people generally like shiny windows and icons and that’s fine for a lot of work. But, when it comes to being an info security professional, GUIs are just wrong in many cases

Why Continuous Learning is Key to Strengthening Cyber Teams

Reading Time: 3 minutes There is a lot out there about the benefits of continuous learning—or continuous professional development—and what we’re gleaning from research is how POWERFUL the approach can be when applied to cyber team training.


Reading Time: 3 minutes When you fly, you are subjected to a lot of requirements when passing through a security checkpoint. You have to take off your belt and jacket, remove everything from your pockets, you can’t carry in liquids more than 3 ounces and on and on.

Project Ares Featured on Computer America Radio

Reading Time: 1 minute Recently, our own Keenan Skelly, VP of Global Partnerships and Security Evangelist with Circadence®, was interviewed by Computer America’s Ben Crossman regarding Project Ares®, our flagship training and assessment platform for cybersecurity professionals. Keenan shared how Project Ares works, what it can be used for and the benefits of gamified training.

Why We Can’t Keep Ignoring Cyber Fatigue

Reading Time: 3 minutes The ever-present threat of cyber attacks is taking its toll on info sec newcomers and veterans alike who are struggling to keep pace and can lead to cyber fatigue, which is a growing concern among both cyber professionals and consumers.

Circadence ranks in top 10 cybersecurity training firms by Black Book Market Research

Reading Time: 1 minute Black Book Market Research, the parent group for Black Book Rankings, recently ranked Circadence® among the top 10 cybersecurity training firms for 2018.

Circadence’s premier cybersecurity training platform, Project Ares®, is an immersive, gamified, AI-powered platform designed to help cyber professionals hone their skills and knowledge to defeat evolving cyber threats.

Common Cyber Security Issues and Challenges

Reading Time: 2 minutes We’re taking a 30,000-foot view of cybersecurity to understand the state of the industry from an enterprise perspective and share some common challenges faced by diverse industries. Doing so provides infosec leaders insight into how challenges emerge in their workplace and potentially a sense of relief knowing their industry (and themselves, as professionals) are not alone in this struggle.

Learning from the Top 5 Financial Cybersecurity Incidents

Reading Time: 3 minutes The financial services industry was the hardest hit with cybercrime in 2013 according to Deloitte. And it continues to rank in the top five most vulnerable industries. In 2017, 69 material cyber incidents were reported to the Financial Conduct Authority, an increase on the 38 incidents in 2016 and 24 in 2015, according to Information Age.  


Reading Time: 3 minutes As an example, if we start on the low end of the scale, the one where everyone has an impact on the company, we talk about security awareness. Companies today generally have security awareness programs to help their employees know how to do the right things when it comes to interactions outside the company and especially with corporate resources and sensitive information.

The Importance of Cybersecurity Awareness and Education (or, how to easily attack your friends and enemies)

Reading Time: 3 minutes While it hasn’t received as much conventional press as, say, the Equifax data breach, there was recently a significant event that took place on the Internet. A service called Memcached, which allows chunks of data to be shared between websites, is or was vulnerable to being misused to send large amounts of data to unsuspecting targets.

SoCal Cyber Cup Challenge Finals Wrap Up 6-Month Long Cyber Program

Reading Time: 2 minutes This past month, the SoCal Cyber Cup Challenge wrapped up a six-month long program and competition intended to educate and prepare the nation’s next generation of cybersecurity professionals. Organized and backed by Securing Our eCity Foundation, National Defense Industrial Association, National University and Circadence, the Challenge provided high school and middle school students the opportunity to learn and practice cyber skills using a gamified, persistent training platform, Project Ares®.

So, You’re An InfoSec N00b

Reading Time: 4 minutes You may be an InfoSec n00b but not all is lost. You are far from alone. Now more than ever, security is everyone’s problem but it’s difficult. So much is taken out of our control in the name of making our life easier that in the end, it can be harder to protect ourselves and, by extension, the companies we may be working for.

Circadence Teams up with MD5 to Support T9Hacks Event at CU Boulder

Reading Time: 2 minutes Major League Hacking opens its 2018 Season at the University of Colorado Boulder with T9Hacks, February 10-11, 2018. Welcome to 24 hours of research, learning, designing, building and solving. With no experience required, T9Hacks is an event planned by college students, for college students, and focuses on creating a unique and engaging venue for women, non-binary, and other gender minority students.

Understanding Malware Analysis

Reading Time: 2 minutes The malware industry has come a long way and currently, it’s a very lucrative business. This is one of many reasons that makes studying malware so fascinating. It’s an interesting mix of technology, psychology, and commerce. Psychology is what makes malware effective, and commerce is what ensures more hackers continue to develop new and interesting malware. 

Four Reasons Your Security Team Should Be Training on a Cyber Range

Reading Time: 3 minutes It seems that every other week another mega-breach is making headlines. Cyber teams barely have time to bolster their cyber defenses before a new attack vector is revealed. It is nearly impossible for teams to train in such a rapidly evolving threat landscape through traditional lecture-based methods. Today’s threats demand an immediate shift in approach.

Circadence® Project Ares® is Training the Next Generation of Cyber Experts in the SoCal Cyber Cup Challenge

Reading Time: 2 minutes Teaching a new generation to become experienced cyber professionals, trained to deal with the latest cyber threats, is critical to ensure the safety of information. Because there is an ever-present threat of cyber criminals who are intent on hacking into systems and causing chaos worldwide, there will always be a need for skilled cybersecurity professionals.

Cyber Practitioners & Students Accept the 2017 Cybersecurity Gaming Challenge at UNCC

Reading Time: 1 minute Each year, the University of North Carolina at Charlotte hosts the Cybersecurity Symposium, bringing world class speakers together to discuss top security challenges, cutting edge technology and best practices for mitigating risk and defending the enterprise. Drawing more than 600 attendees, the conference serves as a platform for important industry dialogue as well as a forum for cybersecurity students to engage with security experts and practitioners.

Circadence Awarded for Cybersecurity Training and Education, Security Software Innovation

Reading Time: 1 minute Circadence® was recently named the Gold Winner for Training and Education and the Bronze Winner for Security Software Innovation in the 2017 Golden Bridge Awards. These annual industry and peer-selected awards encompass the world’s best in organizational performance, product management, and customer satisfaction.

New Draft of NICE Cybersecurity Workforce Framework Expands on Skills, but Team Approach & Simplicity Are Needed

Reading Time: 3 minutes A new draft of the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NCWF) (NIST Special Publication 800-181) was just released and among the many revisions, the framework draft includes most of the tasks and knowledge/skills/activities (KSAs) supporting the 52 work roles previously outlined. Work role details are nearly 95 percent defined—a significant improvement from approximately 50 percent completion in the previous version—with much of the new content focused on categories that would be considered offensive in nature (penetration testing, for example).

Test Your Skills in the Cyber Mission Café during AFCEA TechNet Augusta, Booth #802

Reading Time: 1 minute Security practitioners of all skill levels are invited to join Circadence® at Booth #802 during the TechNet Augusta Conference August 8-10. Spend some time in our Cyber Mission Café testing your cyber skills or practicing offensive and defensive tactics in the gamified, AI-powered Project Ares® platform.

An Educational Institution Roadmap for Women in Cybersecurity

Reading Time: 3 minutes When I was in school, just five percent (5%) of my engineering class were women. Today, according to the 2017 Global Information Security Workforce Study: Women in Cybersecurity, just 11 percent of information security jobs are held by women. And if you look at many security technology providers, you often won’t see a single woman […]

Circadence® Project Ares® Honored for Innovation in Cyber Training

Reading Time: 1 minute Network Products Guide, the IT industry’s leading technology research and advisory guide, named Circadence® Project Ares® a Gold winner in both the IT Products and Services for Education, as well as the Training, Awareness and Educational Programs categories in the 2017 IT World Awards®. Additionally, Circadence was named a Bronze winner for Innovative IT Company of the Year.