This project aims to simulate network attacks and defenses using widely used, powerful tools. It includes the setup, execution, and analysis of common cyber attacks and defenses in a virtualized ...
Collect network events from Zeek, Suricata, and other tools for complete coverage of your network. Cast a wide net to catch the bad guys quickly and easily!
Network attack defense hardens protocols like HTTP ... and orient themselves before deciding which assets to compromise. Native operating system tools are often used toward this post-compromise ...
Ridgeback is an enterprise security software platform that defeats malicious network invasion in real time. Ridgeback’s approach is a disruptive break from traditional retrospective, analytical threat ...
Defense operations need seamless communication and real-time data exchanges. T-Priority from T-Mobile emerges as a ...
The National Security Innovation Network sponsors programs at 50 nationwide universities. Sometime referred to as Hacking for Defense (H4D), it is designed to provide students the opportunity to learn ...