XM Cyber raises $22 million to automate cybersecurity
There’s a reason that by 2021, the number of unfilled cybersecurity jobsworldwide is expected to reach 3.5 million. An estimated 230,000 new forms of malware…
Former Mossad chief’s XM Cyber raises $22m
Tamir Pardo was one of the founders of the Israeli cybersecurity company, which has developed a fully automated APT simulation and remediation platform.
Breach and Attack Simulation: Find Vulnerabilities before the Bad Guys Do
Despite having deployed multiple solutions to create a defense in depth and having followed all the industry best practices, some of the very best…
Watch: Netanyahu, Merkel attend innovation exhibition
PM, German Chancellor attend an innovation exhibit, and meet with Israeli and German businesspeople at the Israel Museum in Jerusalem.
Cybersecurity Is Not a Job for Humans
Is artificial intelligence better suited than humans to keeping our networks safe? Keeping our networks secure from hackers is becoming too big a job for…
Product Review by SC Media – HaXM by XM Cyber
HaXM is a substantive effort by XM Cyber to be among the forefront of advanced persistent threat (APT) simulation platforms that continuously expose all…
XM Cyber Fights Hackers With An Automated Red Team
Automation and artificial intelligence: two technologies that are key in cybersecurity today. Just ask XM Cyber, one of the latest cybersecurity startups to hit…
XM Cyber Recognized in Two Gartner Cybersecurity Reports
Named in “Market Guide for Vulnerability Assessment” and “Hype Cycle for Threat-Facing Technologies, 2018”
Interview of Adi Ashkenazy, VP Product at XM Cyber, on Cyber Defense TV
Adi Ashkenazy, VP Product at XM Cyber, is talking on Cyber Defense TV about Advanced Persistent Threats simulation and remediation to always stay ahead…
These are the 61 most innovative startups in the world
Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual…
How Does IoT Expand Hackers’ Attack Surface?
What constitutes a weak link? And what can be done to mitigate growing threats via IoT?