Attack surfaces are mushrooming Are you prepared?
Today’s businesses are constantly investing in technology to ensure efficient and agile operations. This is a positive development, but the practice has also significantly…
XM Cyber Named ‘Growth Leader’ in Frost Radar™ Global Breach and Attack Simulation, 2022
Also Receives Frost and Sullivan Best Practices Global Customer Value Leadership Award Herzliya, Israel, November 7, 2022 — XM Cyber, the leader in hybrid…
Integrity360 Partners with XM Cyber to Automate Mitigation of Hybrid Cyber Risk
Integrity360, the UK and Ireland’s largest independent cyber security services specialist has today announced its partnership with XM Cyber, the multi-award-winning attack path management company, to…
‘Total Economic Impact’ Study Concludes That XM Cyber Delivered 394% Return On Investment
Attack Path Management Significantly Reduces Risk of Fines and Remediation Expenditures, Reduces Pen Testing and Labor Costs
Do-it-yourself-Security statt abhängig sein
Mit dem Attack Path Management können wir nachvollziehen, welche Wege ein Angreifer im Unternehmensnetzwerk austestet, um zu den kritischen Assets zu gelangen und an…
Wir waren in der geheimen „Kommandozentrale“ der Lidl- und Kaufland-Mutter, von der aus Hacker bekämpft werden
Die Schwarz-Gruppe hatte Ende 2021 das israelische Cybersecurity-Unternehmen XM Cyber gekauft und bietet deren Hacker-Abwehr-System nun in ganz Deutschland an.
How XM Cyber technology can help organizations uncover attack paths and reduce risk.
Intel’s Darren Pulsipher, Chief Solutions Architect, and Paul Giorgi, Director of Sales Engineering, XM Cyber, discuss how XM Cyber technology can help organizations uncover…
Top 20 Breach and Attack Simulation (BAS) Vendors for 2022
This roundup dives into the best in the BAS market, from the top-tier solutions to companies on the rise and honorable mentions.
Cybersecurity Context, Paul Giorgi – XM Cyber
Paul Giorgi, director of sales engineering for XM Cyber, explains how the acquisition of Cyber Observer will add cybersecurity context that is often sorely…
Attack Paths: Just 4 Steps Can Compromise 94% of Assets
Behind every so-called data breach is a more discrete “series of incidents,” typically involving attackers or insiders first gaining access to system and then…
Top attack techniques for breaching enterprise and cloud environments
In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors…
SOC modernization: 8 key considerations
Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans,…
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.