DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

BreakingPoint Cyber Range Solution Used by U.S. European Command to Train Cyber Warriors, Harden Network Defenses and Validate Lawful Intercept System

Posted on November 17, 2011 by Lee J

AUSTIN, TX, Nov 16, 2011 (MARKETWIRE via COMTEX) — BreakingPoint products were used for the second straight year by the U.S. European Command (EUCOM) during Cyber Endeavor 2011 to provide a fully operational cyber range capable of stressing devices, systems and personnel with live Internet-scale cyber war conditions. Cyber Endeavor is the United States European Command’s paramount cyber security collaboration, familiarization and engagement program designed to strengthen partner nation cyber defense capacities through seminars, events and exercises. Cyber Endeavor builds partnerships with NATO, partner nations, academia and industry. During Cyber Endeavor 2011, BreakingPoint cyber range solutions were among those used to conduct exercises to help harden network defenses, conduct advanced cyber security research, validate lawful intercept systems and train cyber warriors. Cyber Endeavor uses BreakingPoint to test network defenses, lawful intercept systems and cyber warrior skills BreakingPoint cyber range products were also used to validate the resiliency of mission-critical lawful intercept systems, which are used to legally analyze data to prevent possible infrastructure or cyber attacks. Cyber Endeavor attendees participated in a hands-on exercise with BreakingPoint experts to learn the basics of lawful intercept systems and how to test their accuracy in the face of stressful network conditions. By creating the behavior of millions of users, participants could create "needle in a haystack" scenarios using blended applications, live cyber attacks and malformed traffic. The lawful intercept system was then hit with this real-world traffic to validate its ability to accurately identify keyword triggers under these hostile conditions. The BreakingPoint cyber range solution was used throughout Cyber Endeavor, including to: — Test and validate the performance, security and stability of critical network infrastructure and network equipment devices. — Demonstrate how to configure and use Network Behavior Anomaly Detection (NBAD) for cyber defense solutions. — Determine the accuracy of real-time application traffic decoding probes using Network Behavior Anomaly Detection (NBAD). Create Internet-Scale Cyber War Conditions "Cyber Endeavor truly supports cyber defense information exchange by bringing together participants from approximately 40 nations and organizations with the primary goal of gaining an understanding of the threats and knowledge on how to better defend and protect their networks and cyber domains. The participants collaborate and train on the most pressing cyber issues facing our collective communities," said William Poole, Cyber Endeavor organizer. "Using the BreakingPoint cyber range technology, participants were able to create Internet-scale cyber war conditions in a controlled, compact and cost-effective environment. The ability to conduct accurate cyber war exercises not only helps train cyber warriors on how to prevent cyber attacks, but it also is used to harden current cyber defenses, validate lawful interception techniques and advance cyber security research across Europe." About BreakingPoint As the standard for IT resiliency, BreakingPoint gives you advance insight into the performance, security and stability of applications, devices, networks and data centers under high-stress conditions. BreakingPoint’s patented products are comprehensive, easy to use and highly scalable, simulating the behavior of millions of online and mobile application users as they work, shop, post, stream, talk, download, spread malware and steal data. By stressing each element of IT infrastructures under these real-world conditions, BreakingPoint quickly and accurately exposes previously impossible-to-detect stress fractures before they are exploited. Find it before they do, at breakingpoint.com.


Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach Incidents

Post navigation

← United States Telecommunications Training Institute Launches New Online Learning Community Based on Enterprise Open-Source Platform
Department of Homeland Security Selects Online Trust Alliance to Provide Training to Government Employees in Support of the National Cybersecurity Ini →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • From bad to worse: Doctor Alliance hacked again by same threat actor
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.