News

Topics

Preparing The Secure Enterprise By Becoming Your Enemy

Addressing The Challenges Of Securing Dynamic Systems And Networks

The hidden reason why companies are struggling to secure cloud infrastructure

Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.

5 Exciting players in the Breach and Attack Simulation (BAS) Cyber Security Category

Breach and Attack Simulation is a new concept that helps organizations evaluate their security posture in a continuous, automated, and repeatable way. This approach…

Researchers Find New Approach in Attacking Cloud Infrastructure

Cloud API’s accessibility over the internet opens a new window for adversaries to gain highly privileged access to cloud assets.

XM Cyber HaXM 1.0

Vendor: XM CyberPrice: Yearly license based on net- work size. Contact: xmcyber.com What it does: Leverages simulations with Purple Team functionality to continuously expose all attack vectors and…

Volkswagen : ŠKODA AUTO DigiLab Israel Ltd commenced operation at the beginning of 2018 and has since made excellent connections in Tel Aviv’s local start-up and tech scene.

ŠKODA AUTO DigiLab Israel Ltd showcases new services and collaborates with more start-ups ŠKODA CEO Bernhard Maier was the main speaker at Israel’s most…

Supporting Breach and Attack Simulation

Read XM Cyber’s interview to TAG Cyber’s 2020 Security Annual on why BAS is one of the most important new controls in cybersecurity.  

Cyber-risk management is about to get easier

New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.

The 20 Worst Metrics in Cybersecurity

Security leaders are increasingly making their case through metrics, as well they should – as long as they’re not one of these.

Swiss Accelerator Kickstart Selects Three Cybersecurity Israeli Startups for Fourth Cohort

As part of the accelerator, the selected startups will be flown to Switzerland to receive mentorship and training by companies including Coca Cola, Credit…

Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable

HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also…

Insights from the exhibition floor at Infosec 2019

We gather the thoughts, opinions and trends from the InfoSecurity 2019 event, held in London, England. One of the most significant events in the cybersecurity industry…

1 12 13 14 15 16 21

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.