Cyberbit website use cookies. By continuing to browse the site you are agreeing to our use of cookies. For more details about cookies and how to manage them, see our cookie policy. Continue


News | Jun 20, 2019

[VIDEO] Cyberbit’s Rakesh Kharwal on Breach Simulation Exercises Are Essential

Businesses need to move beyond security certifications and conduct breach simulation exercises for employees to ensure they’re well-prepared.

Read More link
News | Jun 17, 2019

Cyberbit VP Emphasizes Creating Value and Being Helpful to Customers

Cyberbit is one of the few companies to directly focus on the human aspect of cybersecurity – the security team.

Read More link
News | Jun 12, 2019

Cyberbit Researchers Discover New FormBook Dropper Harbors Obfuscation, Persistence

Researchers warn of future data-theft attack after discovering a new sample of the FormBook malware, with a never-before-seen dropper

Read More link
News | Jun 6, 2019

Businesses, Students Sharpen Cybersecurity at Miami Dade College

Miami Dade College’s Cybersecurity Center of the Americas, with its Cyber Range facility designed by Cyberbit, offers cyber defender training.

Read More link
News | Jun 5, 2019

U. Maine Augusta Opens Cyber Range for Hands-on Student Training

Hands-on practice is one of the best ways for students to strengthen their skill sets and get a competitive edge for when they enter the workforce.

Read More link
News | Jun 2, 2019

Cyberbit Range Enhancements Personalize and Scale Cybersecurity Training

Cyberbit adds group training modules and AI-based virtual instruction to the world’s most deployed cybersecurity training and simulation platform.

Read More link


News | May 31, 2019

Almer Weighs in on Trump’s Executive Order on America’s Cybersecurity Workforce

Cyberbit VP Product lays out a tactical plan for taking the president’s Executive Order on America’s Cybersecurity Workforce from strategy to reality.

Read More link
News | May 30, 2019

Cyberbit Adds Virtual Instructor, New Attack Scenarios to Cyber Range

We emphasize the need for security orchestration and automation to take away manual tasks from analysts and free up their time.

Read More link