DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BreakingPoint Cyber Range Solution Used by U.S. European Command to Train Cyber Warriors, Harden Network Defenses and Validate Lawful Intercept System

Posted on November 17, 2011 by Lee J

AUSTIN, TX, Nov 16, 2011 (MARKETWIRE via COMTEX) — BreakingPoint products were used for the second straight year by the U.S. European Command (EUCOM) during Cyber Endeavor 2011 to provide a fully operational cyber range capable of stressing devices, systems and personnel with live Internet-scale cyber war conditions. Cyber Endeavor is the United States European Command’s paramount cyber security collaboration, familiarization and engagement program designed to strengthen partner nation cyber defense capacities through seminars, events and exercises. Cyber Endeavor builds partnerships with NATO, partner nations, academia and industry. During Cyber Endeavor 2011, BreakingPoint cyber range solutions were among those used to conduct exercises to help harden network defenses, conduct advanced cyber security research, validate lawful intercept systems and train cyber warriors. Cyber Endeavor uses BreakingPoint to test network defenses, lawful intercept systems and cyber warrior skills BreakingPoint cyber range products were also used to validate the resiliency of mission-critical lawful intercept systems, which are used to legally analyze data to prevent possible infrastructure or cyber attacks. Cyber Endeavor attendees participated in a hands-on exercise with BreakingPoint experts to learn the basics of lawful intercept systems and how to test their accuracy in the face of stressful network conditions. By creating the behavior of millions of users, participants could create "needle in a haystack" scenarios using blended applications, live cyber attacks and malformed traffic. The lawful intercept system was then hit with this real-world traffic to validate its ability to accurately identify keyword triggers under these hostile conditions. The BreakingPoint cyber range solution was used throughout Cyber Endeavor, including to: — Test and validate the performance, security and stability of critical network infrastructure and network equipment devices. — Demonstrate how to configure and use Network Behavior Anomaly Detection (NBAD) for cyber defense solutions. — Determine the accuracy of real-time application traffic decoding probes using Network Behavior Anomaly Detection (NBAD). Create Internet-Scale Cyber War Conditions "Cyber Endeavor truly supports cyber defense information exchange by bringing together participants from approximately 40 nations and organizations with the primary goal of gaining an understanding of the threats and knowledge on how to better defend and protect their networks and cyber domains. The participants collaborate and train on the most pressing cyber issues facing our collective communities," said William Poole, Cyber Endeavor organizer. "Using the BreakingPoint cyber range technology, participants were able to create Internet-scale cyber war conditions in a controlled, compact and cost-effective environment. The ability to conduct accurate cyber war exercises not only helps train cyber warriors on how to prevent cyber attacks, but it also is used to harden current cyber defenses, validate lawful interception techniques and advance cyber security research across Europe." About BreakingPoint As the standard for IT resiliency, BreakingPoint gives you advance insight into the performance, security and stability of applications, devices, networks and data centers under high-stress conditions. BreakingPoint’s patented products are comprehensive, easy to use and highly scalable, simulating the behavior of millions of online and mobile application users as they work, shop, post, stream, talk, download, spread malware and steal data. By stressing each element of IT infrastructures under these real-world conditions, BreakingPoint quickly and accurately exposes previously impossible-to-detect stress fractures before they are exploited. Find it before they do, at breakingpoint.com.

Category: Breach Incidents

Post navigation

← United States Telecommunications Training Institute Launches New Online Learning Community Based on Enterprise Open-Source Platform
Department of Homeland Security Selects Online Trust Alliance to Provide Training to Government Employees in Support of the National Cybersecurity Ini →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Google agrees to pay Texas $1.4 billion data privacy settlement
  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.