Top Things To Consider In A Breach And Attack Simulation Platform
The challenge of maintaining robust organizational security has never been tougher. Just consider this: An estimated 350,000 distinct versions of malware are identified daily….
Data, AI and Monitoring in Cybersecurity
In today’s installment of “It’s April May and I’m still catching up on RSA 2020,” I wanted to explore a theme that I encountered repeatedly during…
Changing workplaces: Telecommuters need security too
As users stuck at home try to solve productivity challenges, the amount of shadow IT gaps increases. Hackers are already targeting them in droves…
XM Cyber Named a Gartner ‘Cool Vendor’ in Security Operations and Threat Intelligence
Breach and Attack Simulation Vendor Recognized in Analyst Firm’s Research Designed to Highlight Interesting, New and Innovative Vendors, Products and Services
How Pizza Can Be the Recipe to Understand Cloud Security
It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately,…
Six Security Strategies For Long-Term Work At Home Policies
John Macintosh, Senior Field Engineer, XM Cyber, provides advice to keep your organization secure Regardless of when the current health crisis ends, large organizations should be…
Hacked Again: Here’s How Breach and Attack Simulations Can Tackle AWS Security Incidents
It’s no secret that companies are migrating to AWS at a rapid pace. However as these companies move to the cloud, they may not…
As more people work solo, security leaders offer guidelines
A number of payments industry leaders and security experts spoke with The Green Sheet recently to share insights, educational guidance and unique perspectives on how…
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.