Military Cyber Training Methods

There's a war raging between criminal hackers and corporate computer defense systems, and when it comes to wars, military organisations know how to fight them best.

The Israeli military is known for the high quality of its cybersecurity training, and that's what Cyberbit's Cyber Range offers: The same military-grade training and simulation systems.

Cyberbit was founded in 2015 as a subsidiary of Elbit Systems, a leading Israeli defense contractor. Its goal is to commercialise the cybersecurity training and technologies Elbit had developed in its work with Israel's military and government agencies.

Distributing this former military technology more widely makes sense in today's world, because all companies are essentially on the front lines of a raging cyber war. The military is good at monitoring national borders, but today's borders are much closer. They are in the firewalls and routers.

A corporation's cybersecurity teams are its first responders to a serious attack, and they need to coordinate the use of many different tools within a tight timeframe.

"It's not enough to buy security tools, you need to make sure your people know how to use them and how to combine them against multi-stage attacks," says Adi Dar, CEO of Cyberbit.

"When a company is under attack, people have to know how to work in teams and how to make quick decisions under intense pressure. We make sure they know what to do under many different situations."

Cyberbit's Cyber Range systems get its name from a firing range -- a place where the military tests its weapons and the skills of its soldiers. Cyberbit argues that the same approach should apply to corporate security training: The ability to test the performance of security tools and people in real-world environments.

A key capability of the Cyber Range is being able to create a virtual model of a company's IT network -- its routers, servers, and software, and then simulate many different types of attacks in real-time. These systems are regularly updated to train teams on best ways to respond to the latest types of cyberattacks such as Ransomware. They can also be used to research future possible attack scenarios and proactively prepare defenses.

"The best cybersecurity teams are the ones with the most experience," says Dar. "Our simulations are hyper-realistic which means teams can build experience in dealing with some of the worst and most damaging attacks and then learn from any mistakes without risking the organization."

The shortage of cybersecurity experts in the US is a key driver of Cyber Range system sales as universities and colleges create new courses to meet high demand. Cybersecurity Ventures predicts as many as 3.5 million open cyber security jobs in 2021. Dar says that customers also use the Cyber Range systems to test job applicants and make sure their teams have the required mix of skill sets.

Cyber Range systems have been installed in many US locations and also in India, Australia, France, Germany, and Austria.

Cyberbit also offers Security Orchestration, Automation, and Response software; Industrial Control Systems security; and Endpoint Detection and Response tools. These help filter out high alert volumes created by the complexity of IT systems and can be used in combination against multi-level attacks.

The company is constantly evaluating new security threats. Its Malware Research team recently analysed a new version of the Ursnif Trojan, a highly sophisticated malware creation that uses a file-less technique to hide and steal data

ZDNet

You Might Also Read:

Revealed: Top Secret Israeli Hackers For Hire:

 

 

« White Hat Female Hacker Leads The Way
Meeting The Cyber Talent Challenge Head-On »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DeviceLock

DeviceLock

DeviceLock is a leading provider of endpoint device/port control and data leak prevention software.

Sucuri

Sucuri

Sucuri have offered holistic website security solutions since 2008 including malware removal, malware monitoring and website protection services.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

ThreatMark

ThreatMark

ThreatMark provides fraud detection solutions for digital banking and payments.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

QuickLaunch

QuickLaunch

QuickLaunch transforms how cloud-savvy institutions and companies manage human and device authentication, authorization, access control and integration.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

SAST

SAST

SAST provide Static Application Security Testing as a service based on SAST Tools.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Data#3 Limited (DTL)

Data#3 Limited (DTL)

Data#3 Limited (DTL) is a leading Australian IT services and solutions provider.

Zenity

Zenity

Zenity is the first and only security governance platform for low-code/no-code applications.

Cenobe Cyber Security

Cenobe Cyber Security

Cenobe provides customized solutions to keep you ahead of potential threats and ensure the security of your organization's systems and data.

Kahootz

Kahootz

Kahootz is a highly secure cloud collaboration platform helping teams to work together across organisations.

Hughes Network Systems

Hughes Network Systems

Hughes are industry leaders in networking technologies and services, innovating constantly to deliver the global solutions that power a connected future for people, enterprises and things everywhere.

New Relic

New Relic

After inventing application performance monitoring (APM), New Relic stands at the forefront of observability with the most advanced platform for eliminating digital interruptions.