Resources

A Closer Look at Cyber Attack Simulation
April 01, 2019

Globally, the impact of a data breach on an organization averages $3.86 million, but some of the most serious “mega breaches” can cost hundreds…

XM Cyber is coming to RSA 2019
February 25, 2019

With over 40,000 attendees anticipated to come this year, RSA promises to be once again, a Mecca for the global cybersecurity community. We are…

Red Team and Penetration Testing for Corporate Security
October 24, 2018

How easy is it for a malicious actor to get into your network? Penetration testing seeks to answer this question. Commonly referred to as…

Meet Us at FS-ISAC Fall Summit
October 18, 2018

With thousands attendees from financial institutions anticipated to come this year, FS-ISAC Fall Summit 2018 taking place in Chicago, promises to be once again,…

Countermeasures for APT38
October 11, 2018

APT38 has hit the news wires on several different feeds, they outline what this group has done and how it was able to accomplish…

Did you just create a paradise for hackers? – Part 2
October 04, 2018

Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This…

How Breach and Attack Simulation Helps Enterprises
October 02, 2018

Advanced Persistent Threats (APTs) put intolerable pressure on enterprise cybersecurity countermeasures. Generally reactive in nature, today’s standard cybersecurity controls are overly reliant on detecting…

XM Cyber Honored in 2018 CyberSecurity Breakthrough Award Program
September 27, 2018

Company Recognized for Innovation in the Advanced Persistent Threat Category in Annual Awards Program XM Cyber, founded by top executives from Israel’s cyber intelligence community and…

Breach and Attack Simulation – Know Your Enemy
September 17, 2018

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not…

HLS & Cyber Conference – Here We Come!
September 07, 2018

With over 5,000 attendees from all over the world anticipated to come this year, HLS & Cyber Conference 2018 taking place in Tel Aviv,…

Jiu-Jitsu training and Red/Blue teaming… How are they the same?
September 04, 2018

I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am…

5 Steps to Protect Your Business During This Summer
August 05, 2018

Finally,  your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime,  managed last-minute tasks and set up…

1 34 35 36 37 38

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.