Our vision

XM Cyber, a Schwarz Group Company, is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk. Our award-winning Exposure Management platform lets you continuously see your on-prem and cloud networks through the eyes of an attacker and spot attacks before they happen. Because when you see all the ways in, you can keep them all out.

Why XM Cyber

With the rise of digitalization, security is paramount to protecting growing ecosystems. XM Cyber brings an innovative approach to proactively prevent cyber-attacks by modeling how an attacker propagates the network. By discovering critical attack paths across on-premises and multi-cloud networks, it helps organizations cost-effectively close security gaps before systems are compromised.

“We combine a variety of attack techniques – exactly as the hacker would combine them. And we show you all the possibilities, all the potential attack paths, from any breached point to any of your critical assets, across on premises to cloud networks. Now organizations can gain a single, comprehensive and accurate view of their security posture.”
Noam Erez
CEO of XM Cyber
“Finding and closing security gaps from an attacker’s perspective is a disruptive approach to the way organizations can proactively protect their networks. XM Cyber’s solution builds on our strong IT security to further protect our customers, partners, and ourselves as a company.”
Christian Müller
Chief Information Officer of Schwarz Group

See all ways you can secure the future

If your organization is like most, you’re drowning in siloed data which lacks context of the risk to your critical assets, but you can’t see what impacts your risk the most or how they come together to be exploited by an attacker – much less how to efficiently eliminate them. And that’s a big disconnect. You can see that you’ve invested in all the best tools, but you still can’t see if your network is secure or not. XM Cyber lets you see all ways.

Continuous risk visibility
Accurate risk prioritization
Cost-effective remediation
Hybrid-cloud attack surface reduction
Security posture score and trends

Meet the leadership

Noam Erez
Before co-founding XM Cyber, Noam Erez spent over 25 years with the Israeli Intelligence Community. Mr. Erez brings extensive managerial experience, leading technological and operational divisions, where he planned and executed a growth strategy for cyber capabilities.
Noam Erez Co-Founder and CEO
Tamir Pardo
From 2011 to 2016, Tamir Pardo served as the Director of the Mossad, the National Intelligence Agency of Israel and one of the main entities in the Israeli Intelligence Community. He joined the organization in 1979, and served through all levels of command before assuming overall leadership in 2011. Mr. Pardo is one of the most respected public figures in Israel and around the world. He is also a Lamont Lecturer at Harvard University.
Tamir Pardo Co-Founder and President
Boaz Gorodissky
Boaz Gorodissky is a 30-year veteran of the Israeli Intelligence Community, most recently serving as Head of the Technology. In this role, he re-organized and headed technology divisions, overseeing thousands of engineers and a large-scale budget. Mr. Gorodissky began his career as a software engineer and then founded the first offensive cyber department. Mr. Gorodissky holds a B.Sc. in mathematics and computer science and an M.Sc. in computer science from the university of Tel-Aviv.
Boaz Gorodissky Co-Founder and CTO
Naama Halevi Davidov
Dr. Naama Halevi Davidov is an experienced finance leader, bringing over 25 years of proven track record seeing technology companies through global expansion and scale. Naama holds a CPA (Israel) license, a Ph.D in Strategy from Tel Aviv University and an MBA and  B.A in Accounting and Economics from the Tel Aviv University. Naama servers on the Board of several NASDAQ publicly traded companies and is a mother of four.  
Naama Halevi Davidov CFO
Uri Levy is a seasoned cybersecurity executive with a successful track record in the strategic and operational turnaround of technology and cyber companies. Over the past 15 years, he has built and managed leading network and security solution providers, and consistently achieved sustained growth and brand leadership.
Uri Levy SVP Global Sales
Ronen Segal
Ronen Segal has over 19 years of experience developing and managing complex software products in multi-disciplinary areas – particularly in the cyber offensive field. He previously served as the CTO of Comigo, where he and his teams developed revolutionary products for the TV industry. Before Comigo, Mr. Segal served for 10 years in the IDF’s Elite Intelligence Unit 8200, where he led multiple cyber offensive projects.
Ronen Segal SVP R&D
Menachem Shafran
Menachem Shafran is a product leader with more than 15 years of experience in product management and cybersecurity. Mr. Shafran has managed complex product ranging from cybersecurity, homeland security, DevOps automation to mobile applications. His strength in creating a product vision,  aligning R&D efforts with sales and marketing has been demonstrated over the years during his tenure at Quali, NowForce, now part of Verint (VRNT), and Radware (RDWR). Prior to his roles in product management, Mr. Shafran served for 5 years in the IDF’s Elite Intelligence Unit 8200, where he served both as a researcher and as a team leader. Mr. Shafran holds a B.Sc in mathematics from the Hebrew University and B.Mus in percussion.
Menachem Shafran SVP of Product and Innovation
Sharron brings over 20 years of global enterprise marketing experience across a wide range of activities including, market analysis and strategy, product launch and messaging, building brand and demand. Prior to XM Cyber, she held various marketing leadership roles at Sisense, Minerva Labs, Verint (Cognyte), Tufin and CyberArk. Sharron graduated from Hebrew University and holds an MBA from Tel Aviv University.
Sharron Malaver VP Marketing
Shay has been a cybersecurity evangelist for more than 15 years, working with customers to continually improve their security.He's currently the VP of Customer Experience at XM Cyber, helping customers continuously reduce their cyber exposures and establish holistic and sustainable exposure remediation programs. Shay leads the Customer Success, Services, Support, Operations, and Technical Enablement teams in XM Cyber.
Shay Siksik VP Customer Experience
Mike Heredia
Mike Heredia has been working at the forefront of the cybersecurity industry for over 20 years working with both established systems integrators and high growth software vendors across the industry. Mike has held regional and global leadership positions for the past 15 years.
Mike Heredia VP Sales EMEA
Kent Rounds is an expert in enterprise technology and Cybersecurity Solutions sales with 20+ years of experience. He has sold to F1000 customers in 38 countries and is known for his ability to win sales in highly competitive markets against long odds. He excels at realigning sales teams, scaling them for growth, and coaching them to rapidly achieve significant and sustained sales. Before XM Cyber, he served as Vice President of Sales Threat Intelligence for Crowdstrike and Senior Vice President Sales at McAfee/Intel. His expertise extends to government sales, both domestic and foreign and his experience includes all major geographies: AMS, APAC, Japan, EMEA, and META.
Kent Rounds VP Sales North America
Stree is a recognized industry leader across Asia Pacific for his deep IT, networking and security knowledge, across both public and private sectors. He has also held executive level positions with other NASDAQ listed companies such as Sun Microsystems, Hyperion, Art Technology Group, Plumtree Software, Brio Software, Tumbleweed, Axway and Radware. Prior to joining XM Cyber, he served as Senior Vice President & General Manager of Anomali where he was responsible for the overall business operations across Asia Pacific and Japan.
Stree Naidu VP Sales APJ
Zev Barkan
Before becoming XM Cyber's VPO, Zev Barkan spent over 30 years with the Israeli Intelligence Community. Mr. Barkan brings  managerial experience, leading technological and operational divisions, including areas such as cyber, IT and was in charge of the International Cooperation Division. Mr. Barkan holds a BA in Political Science and Management from the Open University, and a MA in Political Science from Bar Ilan University.
Zev Barkan VP Operations
Zur Ulianitzky
Zur Ulianitzky is an experienced information security researcher, skilled in red teaming and penetration testing. He has published groundbreaking research in the field of cloud security and red teaming with deep expertise in attack techniques from both an offensive and defensive perspective. Prior to joining XM Cyber, he served as an information security consultant at Ernst & Young. During his military service with the Israel Defense Forces, Zur served as a software engineer and team leader developing military communication products.  
Zur Ulianitzky VP Research
An IT Infrastructure division manager with over 30 years of experience in the Israeli Intelligence Community, Shimon has led multi-disciplinary Information Technologies infrastructures in enterprise and complex secured organizations on-premises and in cloud.He is the Co-founder and CEO of Cyber Observer, the premier Cyber Security Continuous Controls Monitoring (CCM) platform. CCM reduces business losses and audit costs by leveraging technology that performs continuous monitoring and auditing, to deliver end-to-end Cyber Security posture management on-premises and in cloud. Shimon holds a B.Sc. in Computer Science.   
Shimon Becker VP Observer Integration
Moti Ram
Software Manager with over 20 years of building and managing complex software system and organizational architectures, Moti served in the CTO office of the Israeli Intelligence Community, building and managing multi-disciplinary projects. He is the Co-founder and VP R&D of Cyber Observer, the premier Cyber Security Continuous Controls Monitoring (CCM) platform. CCM reduces business losses and audit costs by leveraging technology that performs continuous monitoring and auditing, to deliver end-to-end Cyber Security posture management on-premises and in cloud. Moti holds a B.Sc. in Computer Science.
Moti Ram VP Observer Engineering

Our values


Before all, the business goals and success of our customers come first. We create real transformation and insist on making a unique and meaningful impact that generates immediate results.


Security is in our DNA; the cloud is our everyday life. Stopping attacks is what we do. Our motivation will always be driven by true passion to innovate and lead.


Since 2016, we’re on a constant look out for our clients and partners to ensure their needs are being fulfilled.


Patents, security certifications, awards, we are restless visionaries that strive to always be on top of our game.


In order to create great change, we believe a path of trust between us and our customers must be paved.

Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps
September 13, 2023

CyCognito has released its semi-annual State of External Exposure Management Report, revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive…

Report Reveals Alarming Cloud Misconfiguration and Exposed Assets
September 06, 2023

In a bid to shed light on the risks and best practices associated with cloud computing, Qualys has unveiled the 2023 Qualys Cloud Security…

Diagnostic fatigue is causing havoc on cyber efficiency
August 14, 2023

We can all agree that the effective detection and diagnosis of security threats is a fundamental component of cyber resilience. After all, you cannot…

20 Hottest New Cybersecurity Tools At Black Hat 2023
August 13, 2023

At Black Hat 2023 this week, vendors are showcasing new products in segments including XDR, application security, vulnerability management and cloud security.

Understanding Active Directory Attack Paths to Improve Security
August 08, 2023

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies…

Unveiling the Hacker’s Mind: Insights into the Future of Cybersecurity
July 13, 2023

The landscape of cybersecurity is constantly evolving, with emerging technologies reshaping the way we protect our digital infrastructure. One such technology that has garnered…

What is cloud security? Fundamental guide
June 25, 2023

Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to…

Focus Security Efforts on Choke Points, Not Visibility
June 05, 2023

By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them
June 05, 2023

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM…

How ‘quick wins’ can boost cyber agility and resilience 
June 05, 2023

Cybersecurity has reached a major crossroads – and the paradigm for success has shifted. For years, the lack of control over, and visibility into…

Eliminating 2% of Exposures Could Protect 90% of Critical Assets
April 16, 2023

Read more on cloud security here: A 2023 Guide to Secure Cloud Deployment for Improved Application Security

A small number of exposures can put 90 percent of critical assets at risk
April 16, 2023

New research reveals that a small volume of security exposures can put more than 90 percent of an organization’s critical assets at risk of…

Report finds 75% of security exposures don’t put organizations at risk
April 16, 2023

A new report from cybersecurity firm XM Cyber Inc. has found that three-quarters of security exposures don’t put organizations at risk, but a small number of…

Most Attack Paths Are Dead Ends, but 2% Lead to Critical Assets: Report
April 16, 2023

Security posture management firm XM Cyber took tens of thousands of attack path assessments involving more than 60 million exposures affecting 20 million entities…

Cloud Skills Gap a Challenge for Financial Institutions
April 02, 2023

Not having the right talent can lead to poor resource management performance and unnecessary cloud spending, as well as security risks and compliance issues.

XM Cyber Announces Acquisition of Confluera, Adding Run-Time Protection on Cloud workloads to Extend CNAPP Capabilities
March 22, 2023

HERZLIYA, Israel and Palo Alto, California, March 22, 2023 – XM Cyber, the leader in hybrid cloud security, announced today the acquisition of Confluera,…

XM Cyber Signs Distribution Agreement With Ignition Technology
February 17, 2023

February 17th, 2023, Paris, France, Ignition Technology, the specialist distribution division of Exclusive Networks, that focuses on disruptive and fast-growth SaaS based cybersecurity vendors,…

Log4j Vulnerabilities Are Here to Stay — Are You Prepared?
January 29, 2023

Don’t make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually exploitable. Act quickly if the…

Biggest cybercrime trends heading into 2023
January 25, 2023

Paul Giorgi of XM Cyber helps us wrap up 2022 by discussing some of the most unusual and complex attack paths he and XM…

„Sicherheit ist kein technisches, sondern ein semantisches Thema“
January 23, 2023

Die Schwarz Gruppe steht für das einträgliche Geschäft mit Konserven, Obst oder Gemüse. Der Lebensmitteleinzelhändler will nun auch seine Cybersicherheitslösung für andere Unternehmen zugänglich…

XM Cyber’s Cybersecurity Predictions for 2023
January 16, 2023

The discussion of cyber security has grown beyond the IT department and now includes the entire C-suite as well as the Board. As the…

Warum der Lidl-Mutterkonzern Software gegen Hacker verkauft
January 08, 2023

Die Schwarz-Gruppe hat einen IT-Sicherheitsspezialisten gekauft und vermarktet dessen Cyberabwehr nun weiter. Vorstand Schumann will damit das Digitalgeschäft ausbauen.

Extracting Encrypted Credentials From Common Tools
January 02, 2023

Attackers are harvesting credentials from compromised systems. Here’s how some commonly used tools can enable this.

Mit den Augen des Diebes
December 13, 2022

Digitale Attacken auf Firmen nehmen rasant zu. Die Angreifer legen die IT der Opfer lahm und erpressen so viel Geld. Wie eine Spezialeinheit des…

The Cyberwire Daily Podcast’s- Paul Giorgi
November 20, 2022

The Cyberwire Daily Podcast’s recent interview with Paul Giorgi re: “the craziest attack paths”

Cyberattack Patterns Becoming More Sophisticated – Tobias Träbing, XM Cyber
November 16, 2022

Tobias Träbing, technical director for EMEA for XM Cyber, dives into how cyberattack patterns against applications are becoming more sophisticated.

Attack surfaces are mushrooming Are you prepared?
Paul Giorgi | November 08, 2022

Today’s businesses are constantly investing in technology to ensure efficient and agile operations. This is a positive development, but the practice has also significantly…

XM Cyber Named ‘Growth Leader’ in Frost Radar™ Global Breach and Attack Simulation, 2022
November 07, 2022

Also Receives Frost and Sullivan Best Practices Global Customer Value Leadership Award Herzliya, Israel, November 7, 2022 — XM Cyber, the leader in hybrid…

Integrity360 Partners with XM Cyber to Automate Mitigation of Hybrid Cyber Risk
November 07, 2022

Integrity360, the UK and Ireland’s largest independent cyber security services specialist has today announced its partnership with XM Cyber, the multi-award-winning attack path management company, to…

‘Total Economic Impact’ Study Concludes That XM Cyber Delivered 394% Return On Investment
October 06, 2022

Attack Path Management Significantly Reduces Risk of Fines and Remediation Expenditures, Reduces Pen Testing and Labor Costs

Do-it-yourself-Security statt abhängig sein
September 28, 2022

Mit dem Attack Path Management können wir nachvollziehen, welche Wege ein Angreifer im Unternehmensnetzwerk austestet, um zu den kritischen Assets zu gelangen und an…

Wir waren in der geheimen „Kommandozentrale“ der Lidl- und Kaufland-Mutter, von der aus Hacker bekämpft werden
September 06, 2022

Die Schwarz-Gruppe hatte Ende 2021 das israelische Cybersecurity-Unternehmen XM Cyber gekauft und bietet deren Hacker-Abwehr-System nun in ganz Deutschland an.

How XM Cyber technology can help organizations uncover attack paths and reduce risk.
August 29, 2022

Intel’s Darren Pulsipher, Chief Solutions Architect, and Paul Giorgi, Director of Sales Engineering, XM Cyber, discuss how XM Cyber technology can help organizations uncover…

Top 20 Breach and Attack Simulation (BAS) Vendors for 2022
July 27, 2022

This roundup dives into the best in the BAS market, from the top-tier solutions to companies on the rise and honorable mentions.

Cybersecurity Context, Paul Giorgi – XM Cyber
July 20, 2022

Paul Giorgi, director of sales engineering for XM Cyber, explains how the acquisition of Cyber Observer will add cybersecurity context that is often sorely…

Attack Paths: Just 4 Steps Can Compromise 94% of Assets
June 23, 2022

Behind every so-called data breach is a more discrete “series of incidents,” typically involving attackers or insiders first gaining access to system and then…

Wider View of Attack Paths: Safeguarding Crown Jewels: Zur Ulianitzky XM Cyber
June 06, 2022

Attack Paths are not a new phenomenon. In simple terms, an attack path is identifying vulnerabilities that can be exploited by threat actors to…

Top attack techniques for breaching enterprise and cloud environments
May 15, 2022

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors…

SOC modernization: 8 key considerations
April 28, 2022

Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans,…

Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.
April 26, 2022

Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s…

94% of critical assets can be compromised within four steps of the initial breach point
April 07, 2022

An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and cloud environments, demonstrating the…

How many steps does it take for attackers to compromise critical assets?
April 07, 2022

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments.

New and less known cybersecurity risks you should be aware of
April 04, 2022

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM Cyber, gives insights on new and less talked about cybersecurity risks organizations…

Four moves to ‘checkmate’ critical assets thanks to lax cloud security
April 02, 2022

Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report

A Few Clicks from Data Disaster: The State of Enterprise Security
April 02, 2022

Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from being compromised, according to…

Operationalizing a “think like the enemy” strategy
March 12, 2022

MITRE ATT&CK and new security technology innovation make this possible.

Top Things To Consider In A Breach And Attack Simulation Platform
June 10, 2020

The challenge of maintaining robust organizational security has never been tougher. Just consider this: An estimated 350,000 distinct versions of malware are identified daily….

Data, AI and Monitoring in Cybersecurity
May 17, 2020

In today’s installment of “It’s April May and I’m still catching up on RSA 2020,” I wanted to explore a theme that I encountered repeatedly during…

Changing workplaces: Telecommuters need security too
May 12, 2020

As users stuck at home try to solve productivity challenges, the amount of shadow IT gaps increases. Hackers are already targeting them in droves…

XM Cyber Named a Gartner ‘Cool Vendor’ in Security Operations and Threat Intelligence
May 12, 2020

Breach and Attack Simulation Vendor Recognized in Analyst Firm’s Research Designed to Highlight Interesting, New and Innovative Vendors, Products and Services

How Pizza Can Be the Recipe to Understand Cloud Security
May 05, 2020

It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately,…

Six Security Strategies For Long-Term Work At Home Policies
April 14, 2020

John Macintosh, Senior Field Engineer, XM Cyber, provides advice to keep your organization secure Regardless of when the current health crisis ends, large organizations should be…

Hacked Again: Here’s How Breach and Attack Simulations Can Tackle AWS Security Incidents
April 10, 2020

It’s no secret that companies are migrating to AWS at a rapid pace. However as these companies move to the cloud, they may not…

As more people work solo, security leaders offer guidelines
March 31, 2020

A number of payments industry leaders and security experts spoke with The Green Sheet recently to share insights, educational guidance and unique perspectives on how…

Drilling Down with XM Cyber
March 29, 2020

How many times have we watched a movie where there’s a blaring siren and a loudspeaker with a stern voice shouting, “This is not…

Voice of the Vendor: RSA Conference 2020, Part 2
March 24, 2020

He had too much good stuff from this year’s giant RSA security show to fit in one episode, so Joel Zaidspiner is back for…

Protecting Remote Workers From Cyber Threats
March 23, 2020

If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace…

The conventional approach for protecting critical assets is broken. Here’s what’s needed to fix it.
March 19, 2020

Companies are using antiquated assessment methods and suffer from patch paralysis. Here’s how to change it.

Hottest new cybersecurity products at RSA Conference 2020
February 25, 2020

The annual RSA Conference is a key venue for companies to showcase their new cybersecurity products. Here are some of the more interesting tools…

Malproxying: Leave your malware at home
February 11, 2020

Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint…

7 Tech Companies Protecting Businesses From Cyber Threats
February 05, 2020

Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike run the risk of…

7 Key Features of a Breach and Attack System
January 31, 2020

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate…

How to prioritize IT security projects
January 30, 2020

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to…

Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation
January 23, 2020

Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still Amazon Web Services (AWS)…

7 top challenges for chief information security officers in 2020
January 21, 2020

The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter, more creative and more…

Security software reviews, 2019: Lab tests of today’s top tools
December 28, 2019

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or…

Five resolutions for CISOs heading into 2020
December 27, 2019

As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to begin preparing their cyber…

Offensive Cyber Technologies Should not Become Commercial, Says Former Government Exec
December 16, 2019

Boaz Gorodissky, former head of the technology unit at Israel’s Prime Minister’s Office, spoke Monday at a panel held as part of Calcalist’s Cyber…

The 10 greatest issues AI needs to face
December 16, 2019

While we celebrate the positive impacts of artificial intelligence let’s not forget there’s also a lot to be concerned about.

Preparing The Secure Enterprise By Becoming Your Enemy
December 05, 2019

Addressing The Challenges Of Securing Dynamic Systems And Networks

The hidden reason why companies are struggling to secure cloud infrastructure
November 30, 2019

Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.

5 Exciting players in the Breach and Attack Simulation (BAS) Cyber Security Category
November 19, 2019

Breach and Attack Simulation is a new concept that helps organizations evaluate their security posture in a continuous, automated, and repeatable way. This approach…

Researchers Find New Approach in Attacking Cloud Infrastructure
November 11, 2019

Cloud API’s accessibility over the internet opens a new window for adversaries to gain highly privileged access to cloud assets.

XM Cyber HaXM 1.0
November 01, 2019

Vendor: XM CyberPrice: Yearly license based on net- work size. Contact: xmcyber.com What it does: Leverages simulations with Purple Team functionality to continuously expose all attack vectors and…

Volkswagen : ŠKODA AUTO DigiLab Israel Ltd commenced operation at the beginning of 2018 and has since made excellent connections in Tel Aviv’s local start-up and tech scene.
October 31, 2019

ŠKODA AUTO DigiLab Israel Ltd showcases new services and collaborates with more start-ups ŠKODA CEO Bernhard Maier was the main speaker at Israel’s most…

Supporting Breach and Attack Simulation
October 03, 2019

Read XM Cyber’s interview to TAG Cyber’s 2020 Security Annual on why BAS is one of the most important new controls in cybersecurity.  

Cyber-risk management is about to get easier
September 27, 2019

New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.

The 20 Worst Metrics in Cybersecurity
September 19, 2019

Security leaders are increasingly making their case through metrics, as well they should – as long as they’re not one of these.

Swiss Accelerator Kickstart Selects Three Cybersecurity Israeli Startups for Fourth Cohort
July 25, 2019

As part of the accelerator, the selected startups will be flown to Switzerland to receive mentorship and training by companies including Coca Cola, Credit…

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable
July 08, 2019

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also…

Insights from the exhibition floor at Infosec 2019
June 07, 2019

We gather the thoughts, opinions and trends from the InfoSecurity 2019 event, held in London, England. One of the most significant events in the cybersecurity industry…

Your biggest problem isn’t Zero Days: it’s the other 365 (methods of attack)
June 06, 2019

Security personnel are worried about Zero Days, when in reality simple mistakes are their biggest downfall. A CISO’s face might turn a ghostly white…

XM Cyber Wins 2019 Fortress Cyber Security Award
June 05, 2019

PHILADELPHIA, June 5, 2019 /PRNewswire/ — The Business Intelligence Group today announced that XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, has won the 2019 Fortress Cyber Security…

Harness the Power of Purple Team Automation
May 24, 2019

In 2018, the global average cost of a data breach was $3.86m and the average cost for each lost or stolen record containing sensitive and…

Three key takeaways from the 2019 Verizon Data Breach Investigations Report
May 22, 2019

XMCyber’s Menachem Shafran helps you take advantage of the 2019 Verizon Data Breach Investigations Report. Every year, digital security experts, IT personnel and top…

Ex-Mossad director says cyber attacks pose biggest threat to free world
May 22, 2019

The former head of the Mossad, Israel’s intelligence service, warned in a recent interview that the low cost and relative ease for states and…

Logicalis Selects XM Cyber to Power New Purple Team Offering
May 22, 2019

XM Cyber to Demonstrate HaXM Platform at Infosecurity Europe 2019 LONDON, May 22, 2019 /PRNewswire/ —  XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, and Logicalis,…

Unlocking Unicorns — Barclays & Macquarie Partner with SwiftScale
May 21, 2019

The UK continues to be a critical hub for scaling tech businesses. With the support of Barclays and Macquarie, SwiftScale provides high-growth companies with…

Cyber Purple Teaming
May 16, 2019

As someone whose eyes cannot distinguish properly between colors, I always shudder at the thought of mixing up red and blue teams during a…

Breach and Attack Simulation: Risks and Rewards of BAS Solutions
May 06, 2019

One way of determining whether your corporate network is secure is to hire someone to try to hack into it. Having a cybersecurity expert…

Most Promising Israeli Cybersecurity Startups for 2019
April 07, 2019

Around 450 cybersecurity companies are operating in Israel, constituting 5% of the global cybersecurity market. The cybersecurity industry was founded in Israel in the late…

Avoiding Network Security Pitfalls of 3 Next-Gen Technologies
April 05, 2019

Hotels of all sizes continue to fall prey to cyber attacks, while the breadth of data compromised grows exponentially. The practices employed by hackers on…

9 disruptive security plays from RSAC 2019
March 15, 2019

Bad actors have always had the edge in cybersecurity. After all, the good guys have to secure everything, while the bad guys need find…

Opinion: Making Cybersecurity Collaboration Work on a Global Scale
March 13, 2019

Following the French President’s call for a binding international agreement on cybersecurity and cyber warefare, we asked cyber experts for their opinion on the…

RSA Security Conference 2019 Highlights
March 13, 2019

Trends in 2019 for cybersecurity according to the show floor at the RSA Security Conference

XM Cyber Expands HaXM Automated Purple Team Platform With New Capabilities and Certifications
February 24, 2019

Enhanced Platform to be Showcased at RSA Conference 2019 HERZLIYA, Israel, Feb. 20, 2019 /PRNewswire/ — XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, today unveiled…

German Army Seeks to Partner With Israeli Cyber and AI Startups
February 19, 2019

The German army plans to start working with Israeli companies and expand cooperation with Israeli startups, Marcel ‘Otto’ Yon, CEO of the Bundeswehr Cyber…

Leading BAS Vendors Providing High-end Security
February 01, 2019

The number of cyber crimes has been increasing day to day. As the possibility of being hacked is high, many B2B companies have focused on additional…

Israeli Tech Luminaries to Take the Stage at WeTechBerlin
January 31, 2019

Calcalist to lead a delegation of leading figures from Israel’s tech industry to Berlin in February. Following conferences in San Francisco, New York, London,…

Israel jumps to No. 5 on Bloomberg Innovation Index
January 27, 2019

“The Middle Eastern country surpassed Singapore, Sweden and Japan in the process,” said Bloomberg. The index was released as global elites gather at the…

Simulating Lateral Attacks Through Email
January 17, 2019

A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.

Opinion How AI and automation will impact cybersecurity strategies
January 09, 2019

My real first experience with data security came in 2000 when my personal information was exposed on a website where a disgruntled employee was…

2018 Review: Big Investments, High Confidence in Local Solutions for Israel’s Cyber Innovators
December 20, 2018

The Israeli cyber scene is wrapping up a year of big investments, groundbreaking security solutions, cyberespionage allegations, and outgunning ransomware vendors.

11 Top Breach and Attack Simulation (BAS) Vendors
December 13, 2018

A look at the top vendors in the breach and attack simulation (BAS) market, a new IT security technology that promises continuous vulnerability assessment.

First threats in a post-phishing world emerge
December 11, 2018

Researchers at XM Cyber have uncovered a new means of carrying out e-mail attacks without the user or cyber security teams knowing. Attackers convert the user’s…

9 Cyber Attack Simulation Tools to Improve Security
December 10, 2018

Assess your data center security flaws before bad guys do! One of the many news we hear in a current digital era is a…

10 Hot Startups That Raised VC Funding In November
December 07, 2018

AI and cloud technology companies were among the startups that hauled in venture capital rounds in November.

November Startup Funding: Big Deals Dominate
December 07, 2018

A dozen tech startups involved in mobility, software, cybersecurity, robotics and smart payment terminals each raised $100 million or more in November.

Škoda to Unveil its Newest Car in Israel
December 06, 2018

Earlier this week, the Czech automaker announced it is expanding its footprint in Israel through collaborations with three Israel-based auto tech startups

Every day is a fire drill for bank cybersecurity teams
December 05, 2018

Cyberthieves continually hack away at weaknesses in banks’ digital defenses, sometimes coming in waves that involve thousands of attacks. The startup XM Cyber proposes that…

Marriott called to pay for guest passports amid data breach
December 05, 2018

Amid Marriott International’s ongoing data breach, Sen. Chuck Schumer, D-N.Y., is calling for the company to pay for new passports for guests who have had their…

Keyboard and Mouse are the new Bonnie and Clyde: How Can Banks Stop Today’s Cyber Criminals?
November 19, 2018

If you thought the days of the Wild West were over, one look at the banking industry may change your mind. We may no…

XM Cyber Closes $22 Million in Series A Funding
November 13, 2018

Cybersecurity Disruptor will Use New Investment to Fuel Continuous Growth and Innovation

APT Simulation Provider XM Cyber Raises $22 Million
November 13, 2018

XM Cyber, an Israel-based company that provides an automated APT simulation and remediation platform, on Tuesday announced that it has raised $22 million in…

XM Cyber Closes $22M Series A Funding
November 13, 2018

XM Cyber, a Herzliya, Israel-based provider of the an automated APT simulation and remediation platform, closed a $22m Series A funding. Backers included Macquarie Capital,…

Israel’s XM Cyber closes $22m funding
November 13, 2018

Israel-based cybersecurity firm XM Cyber has closed a $22 million Series A funding round with the participation of Macquarie Capital, Nasdaq Ventures, Our Innovation…

Israeli cybersecurity firm XM Cyber raises $22 mln
November 13, 2018

Israeli cybersecurity firm XM Cyber said on Tuesday it raised $22 million in a private funding round, bringing its total raised to date to…

Cyber Start-up Founded by Ex-Mossad Head Raises $22 Million
November 13, 2018

XM Cyber, an award-winning cybersecurity start-up founded by former Mossad director Tamir Pardo and leading figures from the intelligence community, has raised $22 million…

Nasdaq Ventures Backs Cybersecurity Startup Founded by Former Mossad Director
November 13, 2018

XM Cyber, a cybersecurity startup co-founded by retired Mossad Director Tamir Pardo, has raised a $22 million series A, the company announced Tuesday. The…

XM Cyber closes Series A funding round, opens up search for the best MSSP and integrator partners
November 13, 2018

XM Cyber is a startup with a differentiated platform that they describe as a ‘game-changer’ product, that simulates cyber-attacks along the entire attack path to…

XM Cyber raises $22 million to automate cybersecurity
November 13, 2018

There’s a reason that by 2021, the number of unfilled cybersecurity jobsworldwide is expected to reach 3.5 million. An estimated 230,000 new forms of malware…

Former Mossad chief’s XM Cyber raises $22m
November 13, 2018

Tamir Pardo was one of the founders of the Israeli cybersecurity company, which has developed a fully automated APT simulation and remediation platform.

Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do
October 08, 2018

Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best…

Watch: Netanyahu, Merkel attend innovation exhibition
October 04, 2018

PM, German Chancellor attend an innovation exhibit, and meet with Israeli and German businesspeople at the Israel Museum in Jerusalem.

Cybersecurity Is Not a Job for Humans
October 04, 2018

Is artificial intelligence better suited than humans to keeping our networks safe? Keeping our networks secure from hackers is becoming too big a job for…

Product Review by SC Media – HaXM by XM Cyber
October 01, 2018

HaXM is a substantive effort by XM Cyber to be among the forefront of advanced persistent threat (APT) simulation platforms that continuously expose all…

Black Hat 2018: Attack Simulation
August 29, 2018

Inspector Clouseau, of Pink Panther fame, had Cato Fong, his manservant, attack him by surprise to keep his self-defense reflexes strong. (And funny) Businesses…

XM Cyber Fights Hackers With An Automated Red Team
August 16, 2018

Automation and artificial intelligence: two technologies that are key in cybersecurity today. Just ask XM Cyber, one of the latest cybersecurity startups to hit…

AI-Augmented Security: Can Cyberattackers Counter It?
August 08, 2018

XM Cyber’s Adi Ashkenazy on the Latest Trends

All Ahead Full… Bureaucracy: The DoD’s New “Do Not Buy” Software List
August 06, 2018

Another day, another head scratcher from the DoD regarding cyber security policies. BleepingComputer.com reported on July 30 that the Department of Defense (DOD) has been quietly…

XM Cyber Recognized in Two Gartner Cybersecurity Reports
July 31, 2018

Named in “Market Guide for Vulnerability Assessment” and  “Hype Cycle for Threat-Facing Technologies, 2018”

Interview of Adi Ashkenazy, VP Product at XM Cyber, on Cyber Defense TV
July 26, 2018

Adi Ashkenazy, VP Product at XM Cyber, is talking on Cyber Defense TV about Advanced Persistent Threats simulation and remediation to always stay ahead…

These are the 61 most innovative startups in the world
July 04, 2018

Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual…

How Does IoT Expand Hackers’ Attack Surface?
June 27, 2018

What constitutes a weak link? And what can be done to mitigate growing threats via IoT?

Tamir Pardo : « Les entreprises doivent se protéger des cyberattaques comme un Etat organise sa cyber défense »
June 25, 2018

Cofondateur de la start-up XM Cyber et ancien directeur du Mossad, Tamir Pardo

XM Cyber awarded “Technology Pioneer” by World Economic Forum
June 22, 2018

XM Cyber, founded by top executives from Israel’s cyber intelligence community and provider of the first fully automated APT (Advanced Persistent Threat) simulation and…

Cyber attacks are shutting down countries, cities and companies. Here’s how to stop them.
June 22, 2018

What if a cyber attack took over a government’s IT network, bringing an entire nation to its feet? Does this seem like a far-flung…

8 Israeli Startups On World Economic Forum’s 2018 Technology Pioneers List
June 21, 2018

Eight Israeli startups were on the World Economic Forum’s Technology Pioneers cohort of 2018 list, which was unveiled Thursday.

World Economic Forum’s List of Technology Pioneers Recognizes Eight Israeli Startups
June 21, 2018

The WEF named LiDAR company Innoviz, sensor developer Vayyar, and water security startups Water-Gen and Utilis among its 2018 innovative startups list.

World Economic Forum Announces Technology Pioneers 2018 That Will Change The World
June 21, 2018

The World Economic Forum’s Technology Pioneers community are early-stage companies from around the world that are involved in the design, development and deployment of new technologies…

Introducing the Technology Pioneers Cohort of 2018
June 21, 2018

The Technology Pioneers cohort of 2018 brings together 61 early-stage companies from around the world that are pioneering new technologies and innovations ranging from…

In the coming month, we’ll be seeing rival team drama at its best
June 15, 2018

In both the soccer field & security environments, masterminding tactics is key

Purple Pays: XM Cyber and the Importance of Security Automation
June 14, 2018

“The state of global cybersecurity is not faring well,” warns XM Cyber co-founder and CEO Noam Erez, “and the consensus is that it’s about…

Security Mistakes that Could Cripple the Network
June 07, 2018

“Developers are technical and secretive & don’t like being limited. They often have a high level of privileges giving them all kinds of access…

Gartner Security Summit: Enterprises, Vendors Respond to Cybercriminals
June 06, 2018

Vulnerabilities abound and cybercriminals are more aggressive than ever, but enterprises and security vendors are responding – and the sales numbers prove it.

XM Cyber Provides First APT Simulation Platform
June 05, 2018

In effect, XM Cyber’s HaXM platform works as an automated purple team that fluidly combines offensive red teaming with defensive blue teaming to ensure…

XM Cyber’s APT Simulation & Remediation Platform Earns Frost & Sullivan’s Technology Innovation Award
May 31, 2018

XM Cyber’s automated platform, HaXM, empowers organisations to monitor continuously and remediate the gaps in their cybersecurity setup

Spy Games: Ex-Mossad Chief’s Cybersecurity Startup Counters Attacks With A Hacker’s Mindset
May 16, 2018

For decades Tamir Pardo worked in the shadows, in a career that began in the Israeli military’s most elite commando unit and culminated in…

Is there finally a way to tame APTs?
May 06, 2018

With the increasing sophistication of Advanced Persistent Threats (APTs), it’s crucial to stay up-to-date on the latest, most advanced cybersecurity technologies.

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.