Newsroom

Topics

Voice of the Vendor: RSA Conference 2020, Part 2

He had too much good stuff from this year’s giant RSA security show to fit in one episode, so Joel Zaidspiner is back for…

Protecting Remote Workers From Cyber Threats

If you’re reading this from your home while working remotely during the COVID-19 crisis, you’re in good company. A recent study by Global Workplace…

The conventional approach for protecting critical assets is broken. Here’s what’s needed to fix it.

Companies are using antiquated assessment methods and suffer from patch paralysis. Here’s how to change it.

XM Cyber Wins 2020 Cybersecurity Excellence Award for Best Breach and Attack Simulation Solution

BAS Leader Awarded Gold Badge for Both On-Prem and Cloud Security. SAN FRANCISCO, Feb. 24, 2020 /PRNewswire/ — (RSA CONFERENCE 2020)  XM Cyber, the multi-award-winning breach and attack…

RSA Highlight: XM Cyber To Demonstrate First Breach And Attack Simulation (BAS) For Amazon Web Services (AWS)

Protects Enterprises Against Cyber Threats That Combine Traditional On-Prem Attack Methods with Cloud-Specific Techniques SAN FRANCISCO, Feb. 18, 2020 /PRNewswire/ — WHO:     XM Cyber, the multi-award-winning…

Malproxying: Leave your malware at home

Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model is fundamentally flawed. Endpoint…

7 Tech Companies Protecting Businesses From Cyber Threats

Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike run the risk of…

7 Key Features of a Breach and Attack System

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their perspective to help anticipate…

How to prioritize IT security projects

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an overwhelming number of security issues to…

Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation

Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still Amazon Web Services (AWS)…

7 top challenges for chief information security officers in 2020

The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter, more creative and more…

Security software reviews, 2019: Lab tests of today’s top tools

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat is especially successful or…

1 18 19 20 21 22 30

See what attackers see, so you can stop them from doing what attackers do.