Blog

How do you protect your IoT devices from exploitation?
June 19, 2018

What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a…

What to expect at the Gartner Security & Risk Summit 2018
May 31, 2018

Four days of security discussions, over 120 sessions, 60 security analysts and 3,400 attendees. These are just some of the numbers luring security professionals…

Cyberspresso: Piping hot threat & attack news… grab a coffee, get updated
May 30, 2018

Trend alert: Critical infrastructure attacks on the rise Healthcare sectors, critical manufacturing, food production and transportation are also targets  Although cyber security is treated…

GDPR just took effect and you’re hitting the panic button? Take a deep breath.
May 25, 2018

How security auto-testing with actionable remediation could help resolve some problematic GDPR security requirements not met to date. Although the GDPR deadline has just…

Cyberspresso: Piping hot threat & attack news… grab a coffee, get updated
May 21, 2018

An astounding 200M data sets sold on the Dark Web A Chinese-based hacker group has been selling data of approximately 200 million Japanese users….

Cyberspresso: Weekly incidents, threats & attacks… grab a coffee, get updated
May 14, 2018

Not again!Personal Facebook data at the mercy of an entire researcher community… Personal details from gender to relationship status, status updates and personality scores…

Cyberspresso: Weekly incidents, threats & attacks… grab a coffee, get updated
May 07, 2018

Weekly rants and raves from cybersecurity’s trenches Modern day thief, with penchant for Cognac, lives lavish life funded by data sold on the Dark…

Did you just create a paradise for hackers?
May 06, 2018

Why Shadow IT is the oxygen for APTs &  how to contain it? 1st post in series highlighting real life APT attacks examples.  By…

Cyberspresso now: Weekly security incidents, threats & attacks… Grab a coffee, get updated
April 30, 2018

Cybersecurity rants and raves selected by XM Cyber analyst team. Week 18  Our purple hatters rate the news by interest and newsworthiness!   Is…

Cyberspresso: Cybersecurity weekly incidents, threats & attacks… grab a coffee, get updated
April 24, 2018

Cybersecurity rants & raves selected by XM Cyber analyst team.  Our purple hat team rate the news by interest and newsworthiness.   New ransomware…

RSA Conference 2018 Takeaways
April 22, 2018

Trends, technologies and talking points As the RSA conference draws to a close, we’re looking back with red-shot eyes, at the week that was….

Advantages of rethinking from the attacker’s perspective
April 10, 2018

An interview with XM Cyber CEO Noam Erez. “It’s like deploying an army of automated red teams working 24×7 just for you, followed immediately…

1 22 23 24 25

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.