News

Topics

Drilling Down with XM Cyber

How many times have we watched a movie where there’s a blaring siren and a loudspeaker with a stern voice shouting, “This is not…

Voice of the Vendor: RSA Conference 2020, Part 2

He had too much good stuff from this year’s giant RSA security show to fit in one episode, so Joel Zaidspiner is back for…

Protecting Remote Workers From Cyber Threats

If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace…

The conventional approach for protecting critical assets is broken. Here’s what’s needed to fix it.

Companies are using antiquated assessment methods and suffer from patch paralysis. Here’s how to change it.

Malproxying: Leave your malware at home

Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint…

7 Tech Companies Protecting Businesses From Cyber Threats

Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike run the risk of…

7 Key Features of a Breach and Attack System

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate…

How to prioritize IT security projects

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to…

Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation

Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still Amazon Web Services (AWS)…

7 top challenges for chief information security officers in 2020

The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter, more creative and more…

Security software reviews, 2019: Lab tests of today’s top tools

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or…

Five resolutions for CISOs heading into 2020

As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to begin preparing their cyber…

1 11 12 13 14 15 21

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.