News

Topics

Top Things To Consider In A Breach And Attack Simulation Platform

The challenge of maintaining robust organizational security has never been tougher. Just consider this: An estimated 350,000 distinct versions of malware are identified daily….

Data, AI and Monitoring in Cybersecurity

In today’s installment of “It’s April May and I’m still catching up on RSA 2020,” I wanted to explore a theme that I encountered repeatedly during…

Changing workplaces: Telecommuters need security too

As users stuck at home try to solve productivity challenges, the amount of shadow IT gaps increases. Hackers are already targeting them in droves…

XM Cyber Named a Gartner ‘Cool Vendor’ in Security Operations and Threat Intelligence

Breach and Attack Simulation Vendor Recognized in Analyst Firm’s Research Designed to Highlight Interesting, New and Innovative Vendors, Products and Services

How Pizza Can Be the Recipe to Understand Cloud Security

It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately,…

Six Security Strategies For Long-Term Work At Home Policies

John Macintosh, Senior Field Engineer, XM Cyber, provides advice to keep your organization secure Regardless of when the current health crisis ends, large organizations should be…

Hacked Again: Here’s How Breach and Attack Simulations Can Tackle AWS Security Incidents

It’s no secret that companies are migrating to AWS at a rapid pace. However as these companies move to the cloud, they may not…

1 10 11 12 13 14 21

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.