Countermeasures for APT38
APT38 has hit the news wires on several different feeds, they outline what this group has done and how it was able to accomplish…
Did you just create a paradise for hackers? – Part 2
Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This…
How Breach and Attack Simulation Helps Enterprises
Advanced Persistent Threats (APTs) put intolerable pressure on enterprise cybersecurity countermeasures. Generally reactive in nature, today’s standard cybersecurity controls are overly reliant on detecting…
XM Cyber Honored in 2018 CyberSecurity Breakthrough Award Program
Company Recognized for Innovation in the Advanced Persistent Threat Category in Annual Awards Program XM Cyber, founded by top executives from Israel’s cyber intelligence community and…
Breach and Attack Simulation – Know Your Enemy
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not…
HLS & Cyber Conference – Here We Come!
With over 5,000 attendees from all over the world anticipated to come this year, HLS & Cyber Conference 2018 taking place in Tel Aviv,…
Jiu-Jitsu training and Red/Blue teaming… How are they the same?
I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am…
5 Steps to Protect Your Business During This Summer
Finally, your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime, managed last-minute tasks and set up…
XM Cyber is coming to Black Hat 2018
With over 20,000 attendees anticipated to come this year, Black Hat promises to be once again, a Mecca for the global cyber security community….
7 Tips for enduring Black Hat!
Meet us in Black Hat, in the Innovation City, Booth IC 2233. Schedule a meeting.
How can organizations fight a non-human hacker?
Cyber security has a major problem: In the current cyber arms race, it takes far more resources to defend against a cyber-attack than it…
How do you protect your IoT devices from exploitation?
What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a…
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.