Malproxying: Leave your malware at home
Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model…
News
7 Tech Companies Protecting Businesses From Cyber Threats
Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike…
News
7 Key Features of a Breach and Attack System
Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their…
News
How to prioritize IT security projects
If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an…
News
Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation
Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still…
News
7 top challenges for chief information security officers in 2020
The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter,…
News
Security software reviews, 2019: Lab tests of today’s top tools
Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat…
News
Five resolutions for CISOs heading into 2020
As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to…
News
Offensive Cyber Technologies Should not Become Commercial, Says Former Government Exec
Boaz Gorodissky, former head of the technology unit at Israel’s Prime Minister’s Office, spoke Monday at a panel held as…
News
The 10 greatest issues AI needs to face
While we celebrate the positive impacts of artificial intelligence let’s not forget there’s also a lot to be concerned about.
News
Preparing The Secure Enterprise By Becoming Your Enemy
Addressing The Challenges Of Securing Dynamic Systems And Networks
News
XM Cyber Announces the World’s First Breach and Attack Simulation (BAS) for Hybrid Cloud Environments
HaXM Now Maps Potential Attacks On-Premises, In the Network and on Amazon Web Services (AWS) — Continuously and Automatically. HERZLIYA, Israel, Dec.…
Press Releases
Request a demo