News

Topics

How to prioritize IT security projects

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an…
News

Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation

Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still…
News

7 top challenges for chief information security officers in 2020

The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter,…
News
newsroom

Security software reviews, 2019: Lab tests of today’s top tools

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat…
News
newsroom

Five resolutions for CISOs heading into 2020

As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to…
News
newsroom

Offensive Cyber Technologies Should not Become Commercial, Says Former Government Exec

Boaz Gorodissky, former head of the technology unit at Israel’s Prime Minister’s Office, spoke Monday at a panel held as…
News
newsroom

The 10 greatest issues AI needs to face

While we celebrate the positive impacts of artificial intelligence let’s not forget there’s also a lot to be concerned about.
News
newsroom

Preparing The Secure Enterprise By Becoming Your Enemy

Addressing The Challenges Of Securing Dynamic Systems And Networks
News
newsroom

The hidden reason why companies are struggling to secure cloud infrastructure

Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.
News
newsroom

5 Exciting players in the Breach and Attack Simulation (BAS) Cyber Security Category

Breach and Attack Simulation is a new concept that helps organizations evaluate their security posture in a continuous, automated, and…
News
newsroom

Researchers Find New Approach in Attacking Cloud Infrastructure

Cloud API’s accessibility over the internet opens a new window for adversaries to gain highly privileged access to cloud assets.
News
newsroom

XM Cyber HaXM 1.0

Vendor: XM CyberPrice: Yearly license based on net- work size. Contact: xmcyber.com What it does: Leverages simulations with Purple Team functionality to continuously expose…
News
1 14 15 16 17 18 24

Request a demo

See what attackers see, so you can stop them from doing what attackers do.