Voice of the Vendor: RSA Conference 2020, Part 2
He had too much good stuff from this year’s giant RSA security show to fit in one episode, so Joel Zaidspiner is back for…
Protecting Remote Workers From Cyber Threats
If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace…
The conventional approach for protecting critical assets is broken. Here’s what’s needed to fix it.
Companies are using antiquated assessment methods and suffer from patch paralysis. Here’s how to change it.
XM Cyber Wins 2020 Cybersecurity Excellence Award for Best Breach and Attack Simulation Solution
BAS Leader Awarded Gold Badge for Both On-Prem and Cloud Security. SAN FRANCISCO, Feb. 24, 2020 /PRNewswire/ — (RSA CONFERENCE 2020) XM Cyber, the multi-award-winning breach and attack…
RSA Highlight: XM Cyber To Demonstrate First Breach And Attack Simulation (BAS) For Amazon Web Services (AWS)
Protects Enterprises Against Cyber Threats That Combine Traditional On-Prem Attack Methods with Cloud-Specific Techniques SAN FRANCISCO, Feb. 18, 2020 /PRNewswire/ — WHO: XM Cyber, the multi-award-winning…
Malproxying: Leave your malware at home
Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint…
7 Tech Companies Protecting Businesses From Cyber Threats
Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike run the risk of…
7 Key Features of a Breach and Attack System
Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate…
How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to…
Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation
Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still Amazon Web Services (AWS)…
7 top challenges for chief information security officers in 2020
The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter, more creative and more…
Security software reviews, 2019: Lab tests of today’s top tools
Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or…