Newsroom

Topics

Malproxying: Leave your malware at home

Endpoint protection plays a critical role in the modern organizational security stack. Yet the very nature of this security model…
News

7 Tech Companies Protecting Businesses From Cyber Threats

Online security breaches can be devastating to companies and the customers they work with. Big corporations and small businesses alike…
News

7 Key Features of a Breach and Attack System

Truly effective organizational security begins with anticipation and ends with continuous testing. To defeat hackers, it’s imperative to assume their…
News

How to prioritize IT security projects

If you’re an IT security professional, you’re almost certainly familiar with that sinking feeling you experience when presented with an…
News

Keep A Lid On Your AWS Cloud Goodies With Breach And Attach Simulation

Last year had its shares of big data breaches with cloud services. The heavyweight in the cloud market is still…
News

7 top challenges for chief information security officers in 2020

The years come and go, but one thing seems to stay the same for CISOs: Attackers are always growing smarter,…
News
newsroom

Security software reviews, 2019: Lab tests of today’s top tools

Threats are constantly evolving and, just like everything else, tend to follow certain trends. Whenever a new type of threat…
News
newsroom

Five resolutions for CISOs heading into 2020

As we prepare to toss out our old calendar and hang up a new one, it’s critical for CISOs to…
News
newsroom

Offensive Cyber Technologies Should not Become Commercial, Says Former Government Exec

Boaz Gorodissky, former head of the technology unit at Israel’s Prime Minister’s Office, spoke Monday at a panel held as…
News
newsroom

The 10 greatest issues AI needs to face

While we celebrate the positive impacts of artificial intelligence let’s not forget there’s also a lot to be concerned about.
News
newsroom

Preparing The Secure Enterprise By Becoming Your Enemy

Addressing The Challenges Of Securing Dynamic Systems And Networks
News
newsroom

XM Cyber Announces the World’s First Breach and Attack Simulation (BAS) for Hybrid Cloud Environments

HaXM Now Maps Potential Attacks On-Premises, In the Network and on Amazon Web Services (AWS) — Continuously and Automatically. HERZLIYA, Israel, Dec.…
Press Releases
1 19 20 21 22 23 30

Request a demo

See what attackers see, so you can stop them from doing what attackers do.