Our vision

XM Cyber, a Schwarz Group Company, is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our award-winning Exposure Management platform lets you continuously see your on-prem and cloud networks through the eyes of an attacker and spot attacks before they happen. Because when you see all the ways in, you can keep them all out.

Why XM Cyber

With the rise of digitalization, security is paramount to protecting growing ecosystems. XM Cyber brings an innovative approach to proactively prevent cyber-attacks by modeling how an attacker propagates the network. By discovering critical attack paths across on-premises and multi-cloud networks, it helps organizations cost-effectively close security gaps before systems are compromised.

“We combine a variety of attack techniques – exactly as the hacker would combine them. And we show you all the possibilities, all the potential attack paths, from any breached point to any of your critical assets, across on premises to cloud networks. Now organizations can gain a single, comprehensive and accurate view of their security posture.”
Noam Erez
CEO of XM Cyber
“Finding and closing security gaps from an attacker’s perspective is a disruptive approach to the way organizations can proactively protect their networks. XM Cyber’s solution builds on our strong IT security to further protect our customers, partners, and ourselves as a company.”
Christian Müller
Chief Information Officer of Schwarz Group

See all ways you can secure the future

If your organization is like most, you’re drowning in siloed data which lacks context of the risk to your critical assets, but you can’t see what impacts your risk the most or how they come together to be exploited by an attacker – much less how to efficiently eliminate them. And that’s a big disconnect. You can see that you’ve invested in all the best tools, but you still can’t see if your network is secure or not. XM Cyber lets you see all ways.

Continuous risk visibility
Accurate risk prioritization
Cost-effective remediation
Hybrid-cloud attack surface reduction
Security posture score and trends

Meet the leadership

Noam Erez
Before co-founding XM Cyber, Noam Erez spent over 25 years with the Israeli Intelligence Community. Mr. Erez brings extensive managerial experience, leading technological and operational divisions, where he planned and executed a growth strategy for cyber capabilities.
Noam Erez Co-Founder and CEO
Boaz Gorodissky
Boaz Gorodissky is a 30-year veteran of the Israeli Intelligence Community, most recently serving as Head of the Technology. In this role, he re-organized and headed technology divisions, overseeing thousands of engineers and a large-scale budget. Mr. Gorodissky began his career as a software engineer and then founded the first offensive cyber department. Mr. Gorodissky holds a B.Sc. in mathematics and computer science and an M.Sc. in computer science from the university of Tel-Aviv.
Boaz Gorodissky Co-Founder and CTO
Ronen Segal
Ronen Segal has over 19 years of experience developing and managing complex software products in multi-disciplinary areas – particularly in the cyber offensive field. He previously served as the CTO of Comigo, where he and his teams developed revolutionary products for the TV industry. Before Comigo, Mr. Segal served for 10 years in the IDF’s Elite Intelligence Unit 8200, where he led multiple cyber offensive projects.
Ronen Segal SVP R&D
Menachem Shafran
Menachem Shafran is a product leader with more than 15 years of experience in product management and cybersecurity. Mr. Shafran has managed complex product ranging from cybersecurity, homeland security, DevOps automation to mobile applications. His strength in creating a product vision,  aligning R&D efforts with sales and marketing has been demonstrated over the years during his tenure at Quali, NowForce, now part of Verint (VRNT), and Radware (RDWR). Prior to his roles in product management, Mr. Shafran served for 5 years in the IDF’s Elite Intelligence Unit 8200, where he served both as a researcher and as a team leader. Mr. Shafran holds a B.Sc in mathematics from the Hebrew University and B.Mus in percussion.
Menachem Shafran SVP Strategy and Innovation
Sharron
Sharron brings over 20 years of global enterprise marketing experience across a wide range of activities including, market analysis and strategy, product launch and messaging, building brand and demand. Prior to XM Cyber, she held various marketing leadership roles at Sisense, Minerva Labs, Verint (Cognyte), Tufin and CyberArk. Sharron graduated from Hebrew University and holds an MBA from Tel Aviv University.
Sharron Malaver SVP Marketing
Shay
Shay has been a cybersecurity evangelist for more than 15 years, working with customers to continually improve their security.He's currently the VP of Customer Experience at XM Cyber, helping customers continuously reduce their cyber exposures and establish holistic and sustainable exposure remediation programs. Shay leads the Customer Success, Services, Support, Operations, and Technical Enablement teams in XM Cyber.
Shay Siksik SVP Customer Experience
Zev Barkan
Before becoming XM Cyber's VPO, Zev Barkan spent over 30 years with the Israeli Intelligence Community. Mr. Barkan brings  managerial experience, leading technological and operational divisions, including areas such as cyber, IT and was in charge of the International Cooperation Division. Mr. Barkan holds a BA in Political Science and Management from the Open University, and a MA in Political Science from Bar Ilan University.
Zev Barkan SVP Operations
Zur Ulianitzky
Zur Ulianitzky is an experienced information security researcher, skilled in red teaming and penetration testing. He has published groundbreaking research in the field of cloud security and red teaming with deep expertise in attack techniques from both an offensive and defensive perspective. Prior to joining XM Cyber, he served as an information security consultant at Ernst & Young. During his military service with the Israel Defense Forces, Zur served as a software engineer and team leader developing military communication products.  
Zur Ulianitzky SVP Product and Security Research
Shimon
An IT Infrastructure division manager with over 30 years of experience in the Israeli Intelligence Community, Shimon has led multi-disciplinary Information Technologies infrastructures in enterprise and complex secured organizations on-premises and in cloud.He is the Co-founder and CEO of Cyber Observer, the premier Cyber Security Continuous Controls Monitoring (CCM) platform. CCM reduces business losses and audit costs by leveraging technology that performs continuous monitoring and auditing, to deliver end-to-end Cyber Security posture management on-premises and in cloud. Shimon holds a B.Sc. in Computer Science.   
Shimon Becker SVP Observer Integration
Mike Heredia
Mike Heredia has been working at the forefront of the cybersecurity industry for over 20 years working with both established systems integrators and high growth software vendors across the industry. Mike has held regional and global leadership positions for the past 15 years.
Mike Heredia VP Sales EMEA
Kent Rounds is an expert in enterprise technology and Cybersecurity Solutions sales with 20+ years of experience. He has sold to F1000 customers in 38 countries and is known for his ability to win sales in highly competitive markets against long odds. He excels at realigning sales teams, scaling them for growth, and coaching them to rapidly achieve significant and sustained sales. Before XM Cyber, he served as Vice President of Sales Threat Intelligence for Crowdstrike and Senior Vice President Sales at McAfee/Intel. His expertise extends to government sales, both domestic and foreign and his experience includes all major geographies: AMS, APAC, Japan, EMEA, and META.
Kent Rounds VP Sales North America
Stree is a recognized industry leader across Asia Pacific for his deep IT, networking and security knowledge, across both public and private sectors. Stree has held executive level positions with companies such as Imperva, Cato Networks, Sun Microsystems, Brio Software, Hyperion, Plumtree, Axway, Tumbleweed, Radware, Anomali and Art Technology Group. He has a proven track record of effectively executing and growing new territories within Cyber Security, Networking, and Business Intelligence domains with great success.
Stree Naidu VP Sales APJ
Moti Ram
Software Manager with over 20 years of building and managing complex software system and organizational architectures, Moti served in the CTO office of the Israeli Intelligence Community, building and managing multi-disciplinary projects. He is the Co-founder and VP R&D of Cyber Observer, the premier Cyber Security Continuous Controls Monitoring (CCM) platform. CCM reduces business losses and audit costs by leveraging technology that performs continuous monitoring and auditing, to deliver end-to-end Cyber Security posture management on-premises and in cloud. Moti holds a B.Sc. in Computer Science.
Moti Ram VP Observer Engineering

Our values

CUSTOMER VALUE FIRST

Before all, the business goals and success of our customers come first. We create real transformation and insist on making a unique and meaningful impact that generates immediate results.

PASSION

Security is in our DNA; the cloud is our everyday life. Stopping attacks is what we do. Our motivation will always be driven by true passion to innovate and lead.

CONTINUOUS CARE

Since 2016, we’re on a constant look out for our clients and partners to ensure their needs are being fulfilled.

EXECUTION EXCELLENCE

Patents, security certifications, awards, we are restless visionaries that strive to always be on top of our game.

INTEGRITY

In order to create great change, we believe a path of trust between us and our customers must be paved.

What’s the scoop on cyber threat hunters?

XM Cyber announced findings from its third annual State of Exposure Management Report, produced in collaboration with the Cyentia Institute, which found that identity and…

RSA Conference 2024 – Announcements Summary

Hundreds of companies are showcasing their products and services this week at the 2024 edition of the RSA Conference in San Francisco.

XM Cyber: How This Hybrid Cloud Security Company Is Closing the Exposure Remediation Gap

XM Cyber is a leading hybrid cloud security company changing how organizations approach cyber risk. Pulse 2.0 interviewed XM Cyber Chief Technology Officer and…

XM Cyber Introduces First Exposure Management Solution Working Across Environments

XM Cyber, a leader in hybrid cloud exposure management, announced new capabilities that provide complete and continuous visibility into risks and vulnerabilities in Kubernetes…

Securing Active Directory and Azure AD

For more than two decades, Active Directory (AD) has been the default identity and access management service in Windows networks. As enterprises have shifted to the…

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps

CyCognito has released its semi-annual State of External Exposure Management Report, revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive…

Report Reveals Alarming Cloud Misconfiguration and Exposed Assets

In a bid to shed light on the risks and best practices associated with cloud computing, Qualys has unveiled the 2023 Qualys Cloud Security…

Diagnostic fatigue is causing havoc on cyber efficiency

We can all agree that the effective detection and diagnosis of security threats is a fundamental component of cyber resilience. After all, you cannot…

20 Hottest New Cybersecurity Tools At Black Hat 2023

At Black Hat 2023 this week, vendors are showcasing new products in segments including XDR, application security, vulnerability management and cloud security.

Understanding Active Directory Attack Paths to Improve Security

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies…

Unveiling the Hacker’s Mind: Insights into the Future of Cybersecurity

The landscape of cybersecurity is constantly evolving, with emerging technologies reshaping the way we protect our digital infrastructure. One such technology that has garnered…

What is cloud security? Fundamental guide

Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to…

Focus Security Efforts on Choke Points, Not Visibility

By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM…

How ‘quick wins’ can boost cyber agility and resilience 

Cybersecurity has reached a major crossroads – and the paradigm for success has shifted. For years, the lack of control over, and visibility into…

Eliminating 2% of Exposures Could Protect 90% of Critical Assets

Read more on cloud security here: A 2023 Guide to Secure Cloud Deployment for Improved Application Security

A small number of exposures can put 90 percent of critical assets at risk

New research reveals that a small volume of security exposures can put more than 90 percent of an organization’s critical assets at risk of…

Report finds 75% of security exposures don’t put organizations at risk

A new report from cybersecurity firm XM Cyber Inc. has found that three-quarters of security exposures don’t put organizations at risk, but a small number of…

Most Attack Paths Are Dead Ends, but 2% Lead to Critical Assets: Report

Security posture management firm XM Cyber took tens of thousands of attack path assessments involving more than 60 million exposures affecting 20 million entities…

Cloud Skills Gap a Challenge for Financial Institutions

Not having the right talent can lead to poor resource management performance and unnecessary cloud spending, as well as security risks and compliance issues.

XM Cyber Announces Acquisition of Confluera, Adding Run-Time Protection on Cloud workloads to Extend CNAPP Capabilities

HERZLIYA, Israel and Palo Alto, California, March 22, 2023 – XM Cyber, the leader in hybrid cloud security, announced today the acquisition of Confluera,…

XM Cyber Signs Distribution Agreement With Ignition Technology

February 17th, 2023, Paris, France, Ignition Technology, the specialist distribution division of Exclusive Networks, that focuses on disruptive and fast-growth SaaS based cybersecurity vendors,…

Log4j Vulnerabilities Are Here to Stay — Are You Prepared?

Don’t make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the…

Biggest cybercrime trends heading into 2023

Paul Giorgi of XM Cyber helps us wrap up 2022 by discussing some of the most unusual and complex attack paths he and XM…

„Sicherheit ist kein technisches, sondern ein semantisches Thema“

Die Schwarz Gruppe steht für das einträgliche Geschäft mit Konserven, Obst oder Gemüse. Der Lebensmitteleinzelhändler will nun auch seine Cybersicherheitslösung für andere Unternehmen zugänglich…

XM Cyber’s Cybersecurity Predictions for 2023

The discussion of cyber security has grown beyond the IT department and now includes the entire C-suite as well as the Board. As the…

Warum der Lidl-Mutterkonzern Software gegen Hacker verkauft

Die Schwarz-Gruppe hat einen IT-Sicherheitsspezialisten gekauft und vermarktet dessen Cyberabwehr nun weiter. Vorstand Schumann will damit das Digitalgeschäft ausbauen.

Extracting Encrypted Credentials From Common Tools

Attackers are harvesting credentials from compromised systems. Here’s how some commonly used tools can enable this.

Mit den Augen des Diebes

Digitale Attacken auf Firmen nehmen rasant zu. Die Angreifer legen die IT der Opfer lahm und erpressen so viel Geld. Wie eine Spezialeinheit des…

The Cyberwire Daily Podcast’s- Paul Giorgi

The Cyberwire Daily Podcast’s recent interview with Paul Giorgi re: “the craziest attack paths”

Cyberattack Patterns Becoming More Sophisticated – Tobias Träbing, XM Cyber

Tobias Träbing, technical director for EMEA for XM Cyber, dives into how cyberattack patterns against applications are becoming more sophisticated.

Attack surfaces are mushrooming Are you prepared?
Paul Giorgi |

Today’s businesses are constantly investing in technology to ensure efficient and agile operations. This is a positive development, but the practice has also significantly…

XM Cyber Named ‘Growth Leader’ in Frost Radar™ Global Breach and Attack Simulation, 2022

Also Receives Frost and Sullivan Best Practices Global Customer Value Leadership Award Herzliya, Israel, November 7, 2022 — XM Cyber, the leader in hybrid…

Integrity360 Partners with XM Cyber to Automate Mitigation of Hybrid Cyber Risk

Integrity360, the UK and Ireland’s largest independent cyber security services specialist has today announced its partnership with XM Cyber, the multi-award-winning attack path management company, to…

‘Total Economic Impact’ Study Concludes That XM Cyber Delivered 394% Return On Investment

Attack Path Management Significantly Reduces Risk of Fines and Remediation Expenditures, Reduces Pen Testing and Labor Costs

Do-it-yourself-Security statt abhängig sein

Mit dem Attack Path Management können wir nachvollziehen, welche Wege ein Angreifer im Unternehmensnetzwerk austestet, um zu den kritischen Assets zu gelangen und an…

Wir waren in der geheimen „Kommandozentrale“ der Lidl- und Kaufland-Mutter, von der aus Hacker bekämpft werden

Die Schwarz-Gruppe hatte Ende 2021 das israelische Cybersecurity-Unternehmen XM Cyber gekauft und bietet deren Hacker-Abwehr-System nun in ganz Deutschland an.

How XM Cyber technology can help organizations uncover attack paths and reduce risk.

Intel’s Darren Pulsipher, Chief Solutions Architect, and Paul Giorgi, Director of Sales Engineering, XM Cyber, discuss how XM Cyber technology can help organizations uncover…

Top 20 Breach and Attack Simulation (BAS) Vendors for 2022

This roundup dives into the best in the BAS market, from the top-tier solutions to companies on the rise and honorable mentions.

Cybersecurity Context, Paul Giorgi – XM Cyber

Paul Giorgi, director of sales engineering for XM Cyber, explains how the acquisition of Cyber Observer will add cybersecurity context that is often sorely…

Attack Paths: Just 4 Steps Can Compromise 94% of Assets

Behind every so-called data breach is a more discrete “series of incidents,” typically involving attackers or insiders first gaining access to system and then…

Wider View of Attack Paths: Safeguarding Crown Jewels: Zur Ulianitzky XM Cyber

Attack Paths are not a new phenomenon. In simple terms, an attack path is identifying vulnerabilities that can be exploited by threat actors to…

Top attack techniques for breaching enterprise and cloud environments

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors…

SOC modernization: 8 key considerations

Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans,…

Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.

Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s…

94% of critical assets can be compromised within four steps of the initial breach point

An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and cloud environments, demonstrating the…

How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments.

New and less known cybersecurity risks you should be aware of

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM Cyber, gives insights on new and less talked about cybersecurity risks organizations…

Four moves to ‘checkmate’ critical assets thanks to lax cloud security

Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report

A Few Clicks from Data Disaster: The State of Enterprise Security

Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from being compromised, according to…

Operationalizing a “think like the enemy” strategy

MITRE ATT&CK and new security technology innovation make this possible.

Top Things To Consider In A Breach And Attack Simulation Platform

The challenge of maintaining robust organizational security has never been tougher. Just consider this: An estimated 350,000 distinct versions of malware are identified daily….

Data, AI and Monitoring in Cybersecurity

In today’s installment of “It’s April May and I’m still catching up on RSA 2020,” I wanted to explore a theme that I encountered repeatedly during…

Changing workplaces: Telecommuters need security too

As users stuck at home try to solve productivity challenges, the amount of shadow IT gaps increases. Hackers are already targeting them in droves…

XM Cyber Named a Gartner ‘Cool Vendor’ in Security Operations and Threat Intelligence

Breach and Attack Simulation Vendor Recognized in Analyst Firm’s Research Designed to Highlight Interesting, New and Innovative Vendors, Products and Services

How Pizza Can Be the Recipe to Understand Cloud Security

It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately,…

Six Security Strategies For Long-Term Work At Home Policies

John Macintosh, Senior Field Engineer, XM Cyber, provides advice to keep your organization secure Regardless of when the current health crisis ends, large organizations should be…

Hacked Again: Here’s How Breach and Attack Simulations Can Tackle AWS Security Incidents

It’s no secret that companies are migrating to AWS at a rapid pace. However as these companies move to the cloud, they may not…

As more people work solo, security leaders offer guidelines

A number of payments industry leaders and security experts spoke with The Green Sheet recently to share insights, educational guidance and unique perspectives on how…

Drilling Down with XM Cyber

How many times have we watched a movie where there’s a blaring siren and a loudspeaker with a stern voice shouting, “This is not…

Voice of the Vendor: RSA Conference 2020, Part 2

He had too much good stuff from this year’s giant RSA security show to fit in one episode, so Joel Zaidspiner is back for…

Protecting Remote Workers From Cyber Threats

If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace…

The conventional approach for protecting critical assets is broken. Here’s what’s needed to fix it.

Companies are using antiquated assessment methods and suffer from patch paralysis. Here’s how to change it.

Hottest new cybersecurity products at RSA Conference 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools…

Malproxying: Leave your malware at home

Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint…

7 Tech Companies Protecting Businesses From Cyber Threats

Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike run the risk of…

7 Key Features of a Breach and Attack System

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate…

How to prioritize IT security projects

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to…

Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation

Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still Amazon Web Services (AWS)…

7 top challenges for chief information security officers in 2020

The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter, more creative and more…

Security software reviews, 2019: Lab tests of today’s top tools

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or…

Five resolutions for CISOs heading into 2020

As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to begin preparing their cyber…

Offensive Cyber Technologies Should not Become Commercial, Says Former Government Exec

Boaz Gorodissky, former head of the technology unit at Israel’s Prime Minister’s Office, spoke Monday at a panel held as part of Calcalist’s Cyber…

The 10 greatest issues AI needs to face

While we celebrate the positive impacts of artificial intelligence let’s not forget there’s also a lot to be concerned about.

Preparing The Secure Enterprise By Becoming Your Enemy

Addressing The Challenges Of Securing Dynamic Systems And Networks

The hidden reason why companies are struggling to secure cloud infrastructure

Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.

5 Exciting players in the Breach and Attack Simulation (BAS) Cyber Security Category

Breach and Attack Simulation is a new concept that helps organizations evaluate their security posture in a continuous, automated, and repeatable way. This approach…

Researchers Find New Approach in Attacking Cloud Infrastructure

Cloud API’s accessibility over the internet opens a new window for adversaries to gain highly privileged access to cloud assets.

XM Cyber HaXM 1.0

Vendor: XM CyberPrice: Yearly license based on net- work size. Contact: xmcyber.com What it does: Leverages simulations with Purple Team functionality to continuously expose all attack vectors and…

Volkswagen : ŠKODA AUTO DigiLab Israel Ltd commenced operation at the beginning of 2018 and has since made excellent connections in Tel Aviv’s local start-up and tech scene.

ŠKODA AUTO DigiLab Israel Ltd showcases new services and collaborates with more start-ups ŠKODA CEO Bernhard Maier was the main speaker at Israel’s most…

Supporting Breach and Attack Simulation

Read XM Cyber’s interview to TAG Cyber’s 2020 Security Annual on why BAS is one of the most important new controls in cybersecurity.  

Cyber-risk management is about to get easier

New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.

The 20 Worst Metrics in Cybersecurity

Security leaders are increasingly making their case through metrics, as well they should – as long as they’re not one of these.

Swiss Accelerator Kickstart Selects Three Cybersecurity Israeli Startups for Fourth Cohort

As part of the accelerator, the selected startups will be flown to Switzerland to receive mentorship and training by companies including Coca Cola, Credit…

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also…

Insights from the exhibition floor at Infosec 2019

We gather the thoughts, opinions and trends from the InfoSecurity 2019 event, held in London, England. One of the most significant events in the cybersecurity industry…

Your biggest problem isn’t Zero Days: it’s the other 365 (methods of attack)

Security personnel are worried about Zero Days, when in reality simple mistakes are their biggest downfall. A CISO’s face might turn a ghostly white…

XM Cyber Wins 2019 Fortress Cyber Security Award

PHILADELPHIA, June 5, 2019 /PRNewswire/ — The Business Intelligence Group today announced that XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, has won the 2019 Fortress Cyber Security…

Harness the Power of Purple Team Automation

In 2018, the global average cost of a data breach was $3.86m and the average cost for each lost or stolen record containing sensitive and…

Three key takeaways from the 2019 Verizon Data Breach Investigations Report

XMCyber’s Menachem Shafran helps you take advantage of the 2019 Verizon Data Breach Investigations Report. Every year, digital security experts, IT personnel and top…

Ex-Mossad director says cyber attacks pose biggest threat to free world

The former head of the Mossad, Israel’s intelligence service, warned in a recent interview that the low cost and relative ease for states and…

Logicalis Selects XM Cyber to Power New Purple Team Offering

XM Cyber to Demonstrate HaXM Platform at Infosecurity Europe 2019 LONDON, May 22, 2019 /PRNewswire/ —  XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, and Logicalis,…

Unlocking Unicorns — Barclays & Macquarie Partner with SwiftScale

The UK continues to be a critical hub for scaling tech businesses. With the support of Barclays and Macquarie, SwiftScale provides high-growth companies with…

Cyber Purple Teaming

As someone whose eyes cannot distinguish properly between colors, I always shudder at the thought of mixing up red and blue teams during a…

Breach and Attack Simulation: Risks and Rewards of BAS Solutions

One way of determining whether your corporate network is secure is to hire someone to try to hack into it. Having a cybersecurity expert…

Most Promising Israeli Cybersecurity Startups for 2019

Around 450 cybersecurity companies are operating in Israel, constituting 5% of the global cybersecurity market. The cybersecurity industry was founded in Israel in the late…

Avoiding Network Security Pitfalls of 3 Next-Gen Technologies

Hotels of all sizes continue to fall prey to cyber attacks, while the breadth of data compromised grows exponentially. The practices employed by hackers on…

9 disruptive security plays from RSAC 2019

Bad actors have always had the edge in cybersecurity. After all, the good guys have to secure everything, while the bad guys need find…

Opinion: Making Cybersecurity Collaboration Work on a Global Scale

Following the French President’s call for a binding international agreement on cybersecurity and cyber warefare, we asked cyber experts for their opinion on the…

RSA Security Conference 2019 Highlights

Trends in 2019 for cybersecurity according to the show floor at the RSA Security Conference

XM Cyber Expands HaXM Automated Purple Team Platform With New Capabilities and Certifications

Enhanced Platform to be Showcased at RSA Conference 2019 HERZLIYA, Israel, Feb. 20, 2019 /PRNewswire/ — XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, today unveiled…

German Army Seeks to Partner With Israeli Cyber and AI Startups

The German army plans to start working with Israeli companies and expand cooperation with Israeli startups, Marcel ‘Otto’ Yon, CEO of the Bundeswehr Cyber…

Leading BAS Vendors Providing High-end Security

The number of cyber crimes has been increasing day to day. As the possibility of being hacked is high, many B2B companies have focused on additional…

Israeli Tech Luminaries to Take the Stage at WeTechBerlin

Calcalist to lead a delegation of leading figures from Israel’s tech industry to Berlin in February. Following conferences in San Francisco, New York, London,…

Israel jumps to No. 5 on Bloomberg Innovation Index

“The Middle Eastern country surpassed Singapore, Sweden and Japan in the process,” said Bloomberg. The index was released as global elites gather at the…

Simulating Lateral Attacks Through Email

A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.

Opinion How AI and automation will impact cybersecurity strategies

My real first experience with data security came in 2000 when my personal information was exposed on a website where a disgruntled employee was…

2018 Review: Big Investments, High Confidence in Local Solutions for Israel’s Cyber Innovators

The Israeli cyber scene is wrapping up a year of big investments, groundbreaking security solutions, cyberespionage allegations, and outgunning ransomware vendors.

11 Top Breach and Attack Simulation (BAS) Vendors

A look at the top vendors in the breach and attack simulation (BAS) market, a new IT security technology that promises continuous vulnerability assessment.

First threats in a post-phishing world emerge

Researchers at XM Cyber have uncovered a new means of carrying out e-mail attacks without the user or cyber security teams knowing. Attackers convert the user’s…

9 Cyber Attack Simulation Tools to Improve Security

Assess your data center security flaws before bad guys do! One of the many news we hear in a current digital era is a…

10 Hot Startups That Raised VC Funding In November

AI and cloud technology companies were among the startups that hauled in venture capital rounds in November.

November Startup Funding: Big Deals Dominate

A dozen tech startups involved in mobility, software, cybersecurity, robotics and smart payment terminals each raised $100 million or more in November.

Škoda to Unveil its Newest Car in Israel

Earlier this week, the Czech automaker announced it is expanding its footprint in Israel through collaborations with three Israel-based auto tech startups

Every day is a fire drill for bank cybersecurity teams

Cyberthieves continually hack away at weaknesses in banks’ digital defenses, sometimes coming in waves that involve thousands of attacks. The startup XM Cyber proposes that…

Marriott called to pay for guest passports amid data breach

Amid Marriott International’s ongoing data breach, Sen. Chuck Schumer, D-N.Y., is calling for the company to pay for new passports for guests who have had their…

Keyboard and Mouse are the new Bonnie and Clyde: How Can Banks Stop Today’s Cyber Criminals?

If you thought the days of the Wild West were over, one look at the banking industry may change your mind. We may no…

XM Cyber Closes $22 Million in Series A Funding

Cybersecurity Disruptor will Use New Investment to Fuel Continuous Growth and Innovation

APT Simulation Provider XM Cyber Raises $22 Million

XM Cyber, an Israel-based company that provides an automated APT simulation and remediation platform, on Tuesday announced that it has raised $22 million in…

XM Cyber Closes $22M Series A Funding

XM Cyber, a Herzliya, Israel-based provider of the an automated APT simulation and remediation platform, closed a $22m Series A funding. Backers included Macquarie Capital,…

Israel’s XM Cyber closes $22m funding

Israel-based cybersecurity firm XM Cyber has closed a $22 million Series A funding round with the participation of Macquarie Capital, Nasdaq Ventures, Our Innovation…

Israeli cybersecurity firm XM Cyber raises $22 mln

Israeli cybersecurity firm XM Cyber said on Tuesday it raised $22 million in a private funding round, bringing its total raised to date to…

Cyber Start-up Founded by Ex-Mossad Head Raises $22 Million

XM Cyber, an award-winning cybersecurity start-up founded by former Mossad director Tamir Pardo and leading figures from the intelligence community, has raised $22 million…

Nasdaq Ventures Backs Cybersecurity Startup Founded by Former Mossad Director

XM Cyber, a cybersecurity startup co-founded by retired Mossad Director Tamir Pardo, has raised a $22 million series A, the company announced Tuesday. The…

XM Cyber closes Series A funding round, opens up search for the best MSSP and integrator partners

XM Cyber is a startup with a differentiated platform that they describe as a ‘game-changer’ product, that simulates cyber-attacks along the entire attack path to…

XM Cyber raises $22 million to automate cybersecurity

There’s a reason that by 2021, the number of unfilled cybersecurity jobsworldwide is expected to reach 3.5 million. An estimated 230,000 new forms of malware…

Former Mossad chief’s XM Cyber raises $22m

Tamir Pardo was one of the founders of the Israeli cybersecurity company, which has developed a fully automated APT simulation and remediation platform.

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do

Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best…

Watch: Netanyahu, Merkel attend innovation exhibition

PM, German Chancellor attend an innovation exhibit, and meet with Israeli and German businesspeople at the Israel Museum in Jerusalem.

Cybersecurity Is Not a Job for Humans

Is artificial intelligence better suited than humans to keeping our networks safe? Keeping our networks secure from hackers is becoming too big a job for…

Product Review by SC Media – HaXM by XM Cyber

HaXM is a substantive effort by XM Cyber to be among the forefront of advanced persistent threat (APT) simulation platforms that continuously expose all…

Black Hat 2018: Attack Simulation

Inspector Clouseau, of Pink Panther fame, had Cato Fong, his manservant, attack him by surprise to keep his self-defense reflexes strong. (And funny) Businesses…

XM Cyber Fights Hackers With An Automated Red Team

Automation and artificial intelligence: two technologies that are key in cybersecurity today. Just ask XM Cyber, one of the latest cybersecurity startups to hit…

AI-Augmented Security: Can Cyberattackers Counter It?

XM Cyber’s Adi Ashkenazy on the Latest Trends

All Ahead Full… Bureaucracy: The DoD’s New “Do Not Buy” Software List

Another day, another head scratcher from the DoD regarding cyber security policies. BleepingComputer.com reported on July 30 that the Department of Defense (DOD) has been quietly…

XM Cyber Recognized in Two Gartner Cybersecurity Reports

Named in “Market Guide for Vulnerability Assessment” and  “Hype Cycle for Threat-Facing Technologies, 2018”

Interview of Adi Ashkenazy, VP Product at XM Cyber, on Cyber Defense TV

Adi Ashkenazy, VP Product at XM Cyber, is talking on Cyber Defense TV about Advanced Persistent Threats simulation and remediation to always stay ahead…

These are the 61 most innovative startups in the world

Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual…

How Does IoT Expand Hackers’ Attack Surface?

What constitutes a weak link? And what can be done to mitigate growing threats via IoT?

XM Cyber awarded “Technology Pioneer” by World Economic Forum

XM Cyber, founded by top executives from Israel’s cyber intelligence community and provider of the first fully automated APT (Advanced Persistent Threat) simulation and…

Cyber attacks are shutting down countries, cities and companies. Here’s how to stop them.

What if a cyber attack took over a government’s IT network, bringing an entire nation to its feet? Does this seem like a far-flung…

8 Israeli Startups On World Economic Forum’s 2018 Technology Pioneers List

Eight Israeli startups were on the World Economic Forum’s Technology Pioneers cohort of 2018 list, which was unveiled Thursday.

World Economic Forum’s List of Technology Pioneers Recognizes Eight Israeli Startups

The WEF named LiDAR company Innoviz, sensor developer Vayyar, and water security startups Water-Gen and Utilis among its 2018 innovative startups list.

World Economic Forum Announces Technology Pioneers 2018 That Will Change The World

The World Economic Forum’s Technology Pioneers community are early-stage companies from around the world that are involved in the design, development and deployment of new technologies…

Introducing the Technology Pioneers Cohort of 2018

The Technology Pioneers cohort of 2018 brings together 61 early-stage companies from around the world that are pioneering new technologies and innovations ranging from…

In the coming month, we’ll be seeing rival team drama at its best

In both the soccer field & security environments, masterminding tactics is key

Purple Pays: XM Cyber and the Importance of Security Automation

“The state of global cybersecurity is not faring well,” warns XM Cyber co-founder and CEO Noam Erez, “and the consensus is that it’s about…

Security Mistakes that Could Cripple the Network

“Developers are technical and secretive & don’t like being limited. They often have a high level of privileges giving them all kinds of access…

Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals

Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding – and the sales numbers prove it.

XM Cyber Provides First APT Simulation Platform

In effect, XM Cyber’s HaXM platform works as an automated purple team that fluidly combines offensive red teaming with defensive blue teaming to ensure…

XM Cyber’s APT Simulation & Remediation Platform Earns Frost & Sullivan’s Technology Innovation Award

XM Cyber’s automated platform, HaXM, empowers organisations to monitor continuously and remediate the gaps in their cybersecurity setup

Spy Games: Ex-Mossad Chief’s Cybersecurity Startup Counters Attacks With A Hacker’s Mindset

For decades Tamir Pardo worked in the shadows, in a career that began in the Israeli military’s most elite commando unit and culminated in…

Is there finally a way to tame APTs?

With the increasing sophistication of Advanced Persistent Threats (APTs), it’s crucial to stay up-to-date on the latest, most advanced cybersecurity technologies.

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.