Our vision
XM Cyber, a Schwarz Group Company, is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our award-winning Exposure Management platform lets you continuously see your on-prem and cloud networks through the eyes of an attacker and spot attacks before they happen. Because when you see all the ways in, you can keep them all out.
Why XM Cyber
With the rise of digitalization, security is paramount to protecting growing ecosystems. XM Cyber brings an innovative approach to proactively prevent cyber-attacks by modeling how an attacker propagates the network. By discovering critical attack paths across on-premises and multi-cloud networks, it helps organizations cost-effectively close security gaps before systems are compromised.
See all ways you can secure the future
If your organization is like most, you’re drowning in siloed data which lacks context of the risk to your critical assets, but you can’t see what impacts your risk the most or how they come together to be exploited by an attacker – much less how to efficiently eliminate them. And that’s a big disconnect. You can see that you’ve invested in all the best tools, but you still can’t see if your network is secure or not. XM Cyber lets you see all ways.
Continuous risk visibility
Accurate risk prioritization
Cost-effective remediation
Hybrid-cloud attack surface reduction
Security posture score and trends
Meet the leadership
Our values
CUSTOMER VALUE FIRST
Before all, the business goals and success of our customers come first. We create real transformation and insist on making a unique and meaningful impact that generates immediate results.
PASSION
Security is in our DNA; the cloud is our everyday life. Stopping attacks is what we do. Our motivation will always be driven by true passion to innovate and lead.
CONTINUOUS CARE
Since 2016, we’re on a constant look out for our clients and partners to ensure their needs are being fulfilled.
EXECUTION EXCELLENCE
Patents, security certifications, awards, we are restless visionaries that strive to always be on top of our game.
INTEGRITY
In order to create great change, we believe a path of trust between us and our customers must be paved.
Life at XM Cyber
Here at XM Cyber, we never just look at the world from a single, standard point of view. Whether it’s an unexpected customer issue, a stubborn line of code, or a whole new market opportunity, we approach every challenge from every angle – including angles that others wouldn’t see. It’s how we’ve brought such a fresh perspective to cybersecurity. It’s why we’re growing so fast. And it’s how we’re going to continue to do things our industry hasn’t seen before.
Newsroom
NewsroomCIO Influence Interview with Boaz Gorodissky, CTO, XM Cyber
Boaz Gorodissky, CTO, XM Cyber chats about enterprises’ attack paths, the impact of continuous exposure management, and resilient cybersecurity strategy in this catchup.
3 Things Should Know about XM Cyber’s Vulnerability Risk Management (VRM) Solution
Neglecting vulnerability management can have dire consequences. Data breaches, costing an average of $3.92 million per incident (according to the Ponemon Institute), can devastate…
XM Cyber and Endor Labs Win “Most Innovative Technology” Award at Innovate Cybersecurity Summit in Scottsdale
Scottsdale, AZ – Innovate Cybersecurity Summit is excited to announce that XM Cyber and Endor Labs has been awarded the prestigious “Most Innovative Technology” honor…
How CTEM unlocks robust cyber resilience
Cybersecurity professionals ask for less talk and more action in mitigating challenges.
AI Chat: The Game Changer MSPs Need to Defend Expanding Attack Surfaces
Attack surfaces are expanding with cloud adoption and other digital transformation initiatives. As a result, the ability to rapidly identify and address vulnerabilities is…
What’s the scoop on cyber threat hunters?
XM Cyber announced findings from its third annual State of Exposure Management Report, produced in collaboration with the Cyentia Institute, which found that identity and…
RSA Conference 2024 – Announcements Summary
Hundreds of companies are showcasing their products and services this week at the 2024 edition of the RSA Conference in San Francisco.
XM Cyber: How This Hybrid Cloud Security Company Is Closing the Exposure Remediation Gap
XM Cyber is a leading hybrid cloud security company changing how organizations approach cyber risk. Pulse 2.0 interviewed XM Cyber Chief Technology Officer and…
XM Cyber Introduces First Exposure Management Solution Working Across Environments
XM Cyber, a leader in hybrid cloud exposure management, announced new capabilities that provide complete and continuous visibility into risks and vulnerabilities in Kubernetes…
Securing Active Directory and Azure AD
For more than two decades, Active Directory (AD) has been the default identity and access management service in Windows networks. As enterprises have shifted to the…
Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps
CyCognito has released its semi-annual State of External Exposure Management Report, revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive…
Report Reveals Alarming Cloud Misconfiguration and Exposed Assets
In a bid to shed light on the risks and best practices associated with cloud computing, Qualys has unveiled the 2023 Qualys Cloud Security…
Diagnostic fatigue is causing havoc on cyber efficiency
We can all agree that the effective detection and diagnosis of security threats is a fundamental component of cyber resilience. After all, you cannot…
20 Hottest New Cybersecurity Tools At Black Hat 2023
At Black Hat 2023 this week, vendors are showcasing new products in segments including XDR, application security, vulnerability management and cloud security.
Understanding Active Directory Attack Paths to Improve Security
Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies…
Unveiling the Hacker’s Mind: Insights into the Future of Cybersecurity
The landscape of cybersecurity is constantly evolving, with emerging technologies reshaping the way we protect our digital infrastructure. One such technology that has garnered…
What is cloud security? Fundamental guide
Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to…
Focus Security Efforts on Choke Points, Not Visibility
By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM…
How ‘quick wins’ can boost cyber agility and resilience
Cybersecurity has reached a major crossroads – and the paradigm for success has shifted. For years, the lack of control over, and visibility into…
Eliminating 2% of Exposures Could Protect 90% of Critical Assets
Read more on cloud security here: A 2023 Guide to Secure Cloud Deployment for Improved Application Security
A small number of exposures can put 90 percent of critical assets at risk
New research reveals that a small volume of security exposures can put more than 90 percent of an organization’s critical assets at risk of…
Report finds 75% of security exposures don’t put organizations at risk
A new report from cybersecurity firm XM Cyber Inc. has found that three-quarters of security exposures don’t put organizations at risk, but a small number of…
Most Attack Paths Are Dead Ends, but 2% Lead to Critical Assets: Report
Security posture management firm XM Cyber took tens of thousands of attack path assessments involving more than 60 million exposures affecting 20 million entities…
Cloud Skills Gap a Challenge for Financial Institutions
Not having the right talent can lead to poor resource management performance and unnecessary cloud spending, as well as security risks and compliance issues.
XM Cyber Announces Acquisition of Confluera, Adding Run-Time Protection on Cloud workloads to Extend CNAPP Capabilities
HERZLIYA, Israel and Palo Alto, California, March 22, 2023 – XM Cyber, the leader in hybrid cloud security, announced today the acquisition of Confluera,…
XM Cyber Signs Distribution Agreement With Ignition Technology
February 17th, 2023, Paris, France, Ignition Technology, the specialist distribution division of Exclusive Networks, that focuses on disruptive and fast-growth SaaS based cybersecurity vendors,…
Log4j Vulnerabilities Are Here to Stay — Are You Prepared?
Don’t make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the…
Biggest cybercrime trends heading into 2023
Paul Giorgi of XM Cyber helps us wrap up 2022 by discussing some of the most unusual and complex attack paths he and XM…
„Sicherheit ist kein technisches, sondern ein semantisches Thema“
Die Schwarz Gruppe steht für das einträgliche Geschäft mit Konserven, Obst oder Gemüse. Der Lebensmitteleinzelhändler will nun auch seine Cybersicherheitslösung für andere Unternehmen zugänglich…
XM Cyber’s Cybersecurity Predictions for 2023
The discussion of cyber security has grown beyond the IT department and now includes the entire C-suite as well as the Board. As the…
Warum der Lidl-Mutterkonzern Software gegen Hacker verkauft
Die Schwarz-Gruppe hat einen IT-Sicherheitsspezialisten gekauft und vermarktet dessen Cyberabwehr nun weiter. Vorstand Schumann will damit das Digitalgeschäft ausbauen.
Extracting Encrypted Credentials From Common Tools
Attackers are harvesting credentials from compromised systems. Here’s how some commonly used tools can enable this.
Mit den Augen des Diebes
Digitale Attacken auf Firmen nehmen rasant zu. Die Angreifer legen die IT der Opfer lahm und erpressen so viel Geld. Wie eine Spezialeinheit des…
The Cyberwire Daily Podcast’s- Paul Giorgi
The Cyberwire Daily Podcast’s recent interview with Paul Giorgi re: “the craziest attack paths”
Cyberattack Patterns Becoming More Sophisticated – Tobias Träbing, XM Cyber
Tobias Träbing, technical director for EMEA for XM Cyber, dives into how cyberattack patterns against applications are becoming more sophisticated.
Attack surfaces are mushrooming Are you prepared?
Today’s businesses are constantly investing in technology to ensure efficient and agile operations. This is a positive development, but the practice has also significantly…
XM Cyber Named ‘Growth Leader’ in Frost Radar™ Global Breach and Attack Simulation, 2022
Also Receives Frost and Sullivan Best Practices Global Customer Value Leadership Award Herzliya, Israel, November 7, 2022 — XM Cyber, the leader in hybrid…
Integrity360 Partners with XM Cyber to Automate Mitigation of Hybrid Cyber Risk
Integrity360, the UK and Ireland’s largest independent cyber security services specialist has today announced its partnership with XM Cyber, the multi-award-winning attack path management company, to…
‘Total Economic Impact’ Study Concludes That XM Cyber Delivered 394% Return On Investment
Attack Path Management Significantly Reduces Risk of Fines and Remediation Expenditures, Reduces Pen Testing and Labor Costs
Do-it-yourself-Security statt abhängig sein
Mit dem Attack Path Management können wir nachvollziehen, welche Wege ein Angreifer im Unternehmensnetzwerk austestet, um zu den kritischen Assets zu gelangen und an…
Wir waren in der geheimen „Kommandozentrale“ der Lidl- und Kaufland-Mutter, von der aus Hacker bekämpft werden
Die Schwarz-Gruppe hatte Ende 2021 das israelische Cybersecurity-Unternehmen XM Cyber gekauft und bietet deren Hacker-Abwehr-System nun in ganz Deutschland an.
How XM Cyber technology can help organizations uncover attack paths and reduce risk.
Intel’s Darren Pulsipher, Chief Solutions Architect, and Paul Giorgi, Director of Sales Engineering, XM Cyber, discuss how XM Cyber technology can help organizations uncover…
Top 20 Breach and Attack Simulation (BAS) Vendors for 2022
This roundup dives into the best in the BAS market, from the top-tier solutions to companies on the rise and honorable mentions.
Cybersecurity Context, Paul Giorgi – XM Cyber
Paul Giorgi, director of sales engineering for XM Cyber, explains how the acquisition of Cyber Observer will add cybersecurity context that is often sorely…
Attack Paths: Just 4 Steps Can Compromise 94% of Assets
Behind every so-called data breach is a more discrete “series of incidents,” typically involving attackers or insiders first gaining access to system and then…
Top attack techniques for breaching enterprise and cloud environments
In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors…
SOC modernization: 8 key considerations
Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans,…
Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.
Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s…
94% of critical assets can be compromised within four steps of the initial breach point
An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and cloud environments, demonstrating the…
How many steps does it take for attackers to compromise critical assets?
The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments.
New and less known cybersecurity risks you should be aware of
In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM Cyber, gives insights on new and less talked about cybersecurity risks organizations…
Four moves to ‘checkmate’ critical assets thanks to lax cloud security
Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report
A Few Clicks from Data Disaster: The State of Enterprise Security
Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from being compromised, according to…
Operationalizing a “think like the enemy” strategy
MITRE ATT&CK and new security technology innovation make this possible.
Top Things To Consider In A Breach And Attack Simulation Platform
The challenge of maintaining robust organizational security has never been tougher. Just consider this: An estimated 350,000 distinct versions of malware are identified daily….
Data, AI and Monitoring in Cybersecurity
In today’s installment of “It’s April May and I’m still catching up on RSA 2020,” I wanted to explore a theme that I encountered repeatedly during…
Changing workplaces: Telecommuters need security too
As users stuck at home try to solve productivity challenges, the amount of shadow IT gaps increases. Hackers are already targeting them in droves…
XM Cyber Named a Gartner ‘Cool Vendor’ in Security Operations and Threat Intelligence
Breach and Attack Simulation Vendor Recognized in Analyst Firm’s Research Designed to Highlight Interesting, New and Innovative Vendors, Products and Services
How Pizza Can Be the Recipe to Understand Cloud Security
It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately,…
Six Security Strategies For Long-Term Work At Home Policies
John Macintosh, Senior Field Engineer, XM Cyber, provides advice to keep your organization secure Regardless of when the current health crisis ends, large organizations should be…
Hacked Again: Here’s How Breach and Attack Simulations Can Tackle AWS Security Incidents
It’s no secret that companies are migrating to AWS at a rapid pace. However as these companies move to the cloud, they may not…
As more people work solo, security leaders offer guidelines
A number of payments industry leaders and security experts spoke with The Green Sheet recently to share insights, educational guidance and unique perspectives on how…
Drilling Down with XM Cyber
How many times have we watched a movie where there’s a blaring siren and a loudspeaker with a stern voice shouting, “This is not…
Voice of the Vendor: RSA Conference 2020, Part 2
He had too much good stuff from this year’s giant RSA security show to fit in one episode, so Joel Zaidspiner is back for…
Protecting Remote Workers From Cyber Threats
If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace…
The conventional approach for protecting critical assets is broken. Here’s what’s needed to fix it.
Companies are using antiquated assessment methods and suffer from patch paralysis. Here’s how to change it.
Malproxying: Leave your malware at home
Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint…
7 Tech Companies Protecting Businesses From Cyber Threats
Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike run the risk of…
7 Key Features of a Breach and Attack System
Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate…
How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to…
Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation
Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still Amazon Web Services (AWS)…
7 top challenges for chief information security officers in 2020
The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter, more creative and more…
Security software reviews, 2019: Lab tests of today’s top tools
Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or…
Five resolutions for CISOs heading into 2020
As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to begin preparing their cyber…
Offensive Cyber Technologies Should not Become Commercial, Says Former Government Exec
Boaz Gorodissky, former head of the technology unit at Israel’s Prime Minister’s Office, spoke Monday at a panel held as part of Calcalist’s Cyber…
The 10 greatest issues AI needs to face
While we celebrate the positive impacts of artificial intelligence let’s not forget there’s also a lot to be concerned about.
Preparing The Secure Enterprise By Becoming Your Enemy
Addressing The Challenges Of Securing Dynamic Systems And Networks
The hidden reason why companies are struggling to secure cloud infrastructure
Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.
5 Exciting players in the Breach and Attack Simulation (BAS) Cyber Security Category
Breach and Attack Simulation is a new concept that helps organizations evaluate their security posture in a continuous, automated, and repeatable way. This approach…
Researchers Find New Approach in Attacking Cloud Infrastructure
Cloud API’s accessibility over the internet opens a new window for adversaries to gain highly privileged access to cloud assets.
XM Cyber HaXM 1.0
Vendor: XM CyberPrice: Yearly license based on net- work size. Contact: xmcyber.com What it does: Leverages simulations with Purple Team functionality to continuously expose all attack vectors and…
Volkswagen : ŠKODA AUTO DigiLab Israel Ltd commenced operation at the beginning of 2018 and has since made excellent connections in Tel Aviv’s local start-up and tech scene.
ŠKODA AUTO DigiLab Israel Ltd showcases new services and collaborates with more start-ups ŠKODA CEO Bernhard Maier was the main speaker at Israel’s most…
Supporting Breach and Attack Simulation
Read XM Cyber’s interview to TAG Cyber’s 2020 Security Annual on why BAS is one of the most important new controls in cybersecurity.
Cyber-risk management is about to get easier
New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.
The 20 Worst Metrics in Cybersecurity
Security leaders are increasingly making their case through metrics, as well they should – as long as they’re not one of these.
Swiss Accelerator Kickstart Selects Three Cybersecurity Israeli Startups for Fourth Cohort
As part of the accelerator, the selected startups will be flown to Switzerland to receive mentorship and training by companies including Coca Cola, Credit…
Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable
HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also…
Insights from the exhibition floor at Infosec 2019
We gather the thoughts, opinions and trends from the InfoSecurity 2019 event, held in London, England. One of the most significant events in the cybersecurity industry…
Your biggest problem isn’t Zero Days: it’s the other 365 (methods of attack)
Security personnel are worried about Zero Days, when in reality simple mistakes are their biggest downfall. A CISO’s face might turn a ghostly white…
Harness the Power of Purple Team Automation
In 2018, the global average cost of a data breach was $3.86m and the average cost for each lost or stolen record containing sensitive and…
Three key takeaways from the 2019 Verizon Data Breach Investigations Report
XMCyber’s Menachem Shafran helps you take advantage of the 2019 Verizon Data Breach Investigations Report. Every year, digital security experts, IT personnel and top…
Ex-Mossad director says cyber attacks pose biggest threat to free world
The former head of the Mossad, Israel’s intelligence service, warned in a recent interview that the low cost and relative ease for states and…
Logicalis Selects XM Cyber to Power New Purple Team Offering
XM Cyber to Demonstrate HaXM Platform at Infosecurity Europe 2019 LONDON, May 22, 2019 /PRNewswire/ — XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, and Logicalis,…
Unlocking Unicorns — Barclays & Macquarie Partner with SwiftScale
The UK continues to be a critical hub for scaling tech businesses. With the support of Barclays and Macquarie, SwiftScale provides high-growth companies with…
Cyber Purple Teaming
As someone whose eyes cannot distinguish properly between colors, I always shudder at the thought of mixing up red and blue teams during a…
Breach and Attack Simulation: Risks and Rewards of BAS Solutions
One way of determining whether your corporate network is secure is to hire someone to try to hack into it. Having a cybersecurity expert…
Most Promising Israeli Cybersecurity Startups for 2019
Around 450 cybersecurity companies are operating in Israel, constituting 5% of the global cybersecurity market. The cybersecurity industry was founded in Israel in the late…
Avoiding Network Security Pitfalls of 3 Next-Gen Technologies
Hotels of all sizes continue to fall prey to cyber attacks, while the breadth of data compromised grows exponentially. The practices employed by hackers on…
9 disruptive security plays from RSAC 2019
Bad actors have always had the edge in cybersecurity. After all, the good guys have to secure everything, while the bad guys need find…
Opinion: Making Cybersecurity Collaboration Work on a Global Scale
Following the French President’s call for a binding international agreement on cybersecurity and cyber warefare, we asked cyber experts for their opinion on the…
RSA Security Conference 2019 Highlights
Trends in 2019 for cybersecurity according to the show floor at the RSA Security Conference
XM Cyber Expands HaXM Automated Purple Team Platform With New Capabilities and Certifications
Enhanced Platform to be Showcased at RSA Conference 2019 HERZLIYA, Israel, Feb. 20, 2019 /PRNewswire/ — XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, today unveiled…
German Army Seeks to Partner With Israeli Cyber and AI Startups
The German army plans to start working with Israeli companies and expand cooperation with Israeli startups, Marcel ‘Otto’ Yon, CEO of the Bundeswehr Cyber…
Leading BAS Vendors Providing High-end Security
The number of cyber crimes has been increasing day to day. As the possibility of being hacked is high, many B2B companies have focused on additional…
Israeli Tech Luminaries to Take the Stage at WeTechBerlin
Calcalist to lead a delegation of leading figures from Israel’s tech industry to Berlin in February. Following conferences in San Francisco, New York, London,…
Israel jumps to No. 5 on Bloomberg Innovation Index
“The Middle Eastern country surpassed Singapore, Sweden and Japan in the process,” said Bloomberg. The index was released as global elites gather at the…
Simulating Lateral Attacks Through Email
A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.
Opinion How AI and automation will impact cybersecurity strategies
My real first experience with data security came in 2000 when my personal information was exposed on a website where a disgruntled employee was…
2018 Review: Big Investments, High Confidence in Local Solutions for Israel’s Cyber Innovators
The Israeli cyber scene is wrapping up a year of big investments, groundbreaking security solutions, cyberespionage allegations, and outgunning ransomware vendors.
11 Top Breach and Attack Simulation (BAS) Vendors
A look at the top vendors in the breach and attack simulation (BAS) market, a new IT security technology that promises continuous vulnerability assessment.
First threats in a post-phishing world emerge
Researchers at XM Cyber have uncovered a new means of carrying out e-mail attacks without the user or cyber security teams knowing. Attackers convert the user’s…
9 Cyber Attack Simulation Tools to Improve Security
Assess your data center security flaws before bad guys do! One of the many news we hear in a current digital era is a…
10 Hot Startups That Raised VC Funding In November
AI and cloud technology companies were among the startups that hauled in venture capital rounds in November.
November Startup Funding: Big Deals Dominate
A dozen tech startups involved in mobility, software, cybersecurity, robotics and smart payment terminals each raised $100 million or more in November.
Škoda to Unveil its Newest Car in Israel
Earlier this week, the Czech automaker announced it is expanding its footprint in Israel through collaborations with three Israel-based auto tech startups
Every day is a fire drill for bank cybersecurity teams
Cyberthieves continually hack away at weaknesses in banks’ digital defenses, sometimes coming in waves that involve thousands of attacks. The startup XM Cyber proposes that…
Marriott called to pay for guest passports amid data breach
Amid Marriott International’s ongoing data breach, Sen. Chuck Schumer, D-N.Y., is calling for the company to pay for new passports for guests who have had their…
Keyboard and Mouse are the new Bonnie and Clyde: How Can Banks Stop Today’s Cyber Criminals?
If you thought the days of the Wild West were over, one look at the banking industry may change your mind. We may no…
XM Cyber Closes $22 Million in Series A Funding
Cybersecurity Disruptor will Use New Investment to Fuel Continuous Growth and Innovation
APT Simulation Provider XM Cyber Raises $22 Million
XM Cyber, an Israel-based company that provides an automated APT simulation and remediation platform, on Tuesday announced that it has raised $22 million in…
XM Cyber Closes $22M Series A Funding
XM Cyber, a Herzliya, Israel-based provider of the an automated APT simulation and remediation platform, closed a $22m Series A funding. Backers included Macquarie Capital,…
Israel’s XM Cyber closes $22m funding
Israel-based cybersecurity firm XM Cyber has closed a $22 million Series A funding round with the participation of Macquarie Capital, Nasdaq Ventures, Our Innovation…
Israeli cybersecurity firm XM Cyber raises $22 mln
Israeli cybersecurity firm XM Cyber said on Tuesday it raised $22 million in a private funding round, bringing its total raised to date to…
Cyber Start-up Founded by Ex-Mossad Head Raises $22 Million
XM Cyber, an award-winning cybersecurity start-up founded by former Mossad director Tamir Pardo and leading figures from the intelligence community, has raised $22 million…
Nasdaq Ventures Backs Cybersecurity Startup Founded by Former Mossad Director
XM Cyber, a cybersecurity startup co-founded by retired Mossad Director Tamir Pardo, has raised a $22 million series A, the company announced Tuesday. The…
XM Cyber closes Series A funding round, opens up search for the best MSSP and integrator partners
XM Cyber is a startup with a differentiated platform that they describe as a ‘game-changer’ product, that simulates cyber-attacks along the entire attack path to…
XM Cyber raises $22 million to automate cybersecurity
There’s a reason that by 2021, the number of unfilled cybersecurity jobsworldwide is expected to reach 3.5 million. An estimated 230,000 new forms of malware…
Former Mossad chief’s XM Cyber raises $22m
Tamir Pardo was one of the founders of the Israeli cybersecurity company, which has developed a fully automated APT simulation and remediation platform.
Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do
Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best…
Watch: Netanyahu, Merkel attend innovation exhibition
PM, German Chancellor attend an innovation exhibit, and meet with Israeli and German businesspeople at the Israel Museum in Jerusalem.
Cybersecurity Is Not a Job for Humans
Is artificial intelligence better suited than humans to keeping our networks safe? Keeping our networks secure from hackers is becoming too big a job for…
Product Review by SC Media – HaXM by XM Cyber
HaXM is a substantive effort by XM Cyber to be among the forefront of advanced persistent threat (APT) simulation platforms that continuously expose all…
XM Cyber Fights Hackers With An Automated Red Team
Automation and artificial intelligence: two technologies that are key in cybersecurity today. Just ask XM Cyber, one of the latest cybersecurity startups to hit…
XM Cyber Recognized in Two Gartner Cybersecurity Reports
Named in “Market Guide for Vulnerability Assessment” and “Hype Cycle for Threat-Facing Technologies, 2018”
Interview of Adi Ashkenazy, VP Product at XM Cyber, on Cyber Defense TV
Adi Ashkenazy, VP Product at XM Cyber, is talking on Cyber Defense TV about Advanced Persistent Threats simulation and remediation to always stay ahead…
These are the 61 most innovative startups in the world
Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual…
How Does IoT Expand Hackers’ Attack Surface?
What constitutes a weak link? And what can be done to mitigate growing threats via IoT?
Tamir Pardo : « Les entreprises doivent se protéger des cyberattaques comme un Etat organise sa cyber défense »
Cofondateur de la start-up XM Cyber et ancien directeur du Mossad, Tamir Pardo
XM Cyber awarded “Technology Pioneer” by World Economic Forum
XM Cyber, founded by top executives from Israel’s cyber intelligence community and provider of the first fully automated APT (Advanced Persistent Threat) simulation and…
Cyber attacks are shutting down countries, cities and companies. Here’s how to stop them.
What if a cyber attack took over a government’s IT network, bringing an entire nation to its feet? Does this seem like a far-flung…
8 Israeli Startups On World Economic Forum’s 2018 Technology Pioneers List
Eight Israeli startups were on the World Economic Forum’s Technology Pioneers cohort of 2018 list, which was unveiled Thursday.
World Economic Forum’s List of Technology Pioneers Recognizes Eight Israeli Startups
The WEF named LiDAR company Innoviz, sensor developer Vayyar, and water security startups Water-Gen and Utilis among its 2018 innovative startups list.
World Economic Forum Announces Technology Pioneers 2018 That Will Change The World
The World Economic Forum’s Technology Pioneers community are early-stage companies from around the world that are involved in the design, development and deployment of new technologies…
Introducing the Technology Pioneers Cohort of 2018
The Technology Pioneers cohort of 2018 brings together 61 early-stage companies from around the world that are pioneering new technologies and innovations ranging from…
In the coming month, we’ll be seeing rival team drama at its best
In both the soccer field & security environments, masterminding tactics is key
Purple Pays: XM Cyber and the Importance of Security Automation
“The state of global cybersecurity is not faring well,” warns XM Cyber co-founder and CEO Noam Erez, “and the consensus is that it’s about…
Security Mistakes that Could Cripple the Network
“Developers are technical and secretive & don’t like being limited. They often have a high level of privileges giving them all kinds of access…
Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals
Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding – and the sales numbers prove it.
XM Cyber Provides First APT Simulation Platform
In effect, XM Cyber’s HaXM platform works as an automated purple team that fluidly combines offensive red teaming with defensive blue teaming to ensure…
XM Cyber’s APT Simulation & Remediation Platform Earns Frost & Sullivan’s Technology Innovation Award
XM Cyber’s automated platform, HaXM, empowers organisations to monitor continuously and remediate the gaps in their cybersecurity setup
Spy Games: Ex-Mossad Chief’s Cybersecurity Startup Counters Attacks With A Hacker’s Mindset
For decades Tamir Pardo worked in the shadows, in a career that began in the Israeli military’s most elite commando unit and culminated in…
Is there finally a way to tame APTs?
With the increasing sophistication of Advanced Persistent Threats (APTs), it’s crucial to stay up-to-date on the latest, most advanced cybersecurity technologies.
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.