Resources

Cyberspresso: Weekly incidents, threats & attacks… grab a coffee, get updated
May 07, 2018

Weekly rants and raves from cybersecurity’s trenches Modern day thief, with penchant for Cognac, lives lavish life funded by data sold on the Dark…

Did you just create a paradise for hackers?
May 06, 2018

Why Shadow IT is the oxygen for APTs &  how to contain it? 1st post in series highlighting real life APT attacks examples.  By…

Cyberspresso now: Weekly security incidents, threats & attacks… Grab a coffee, get updated
April 30, 2018

Cybersecurity rants and raves selected by XM Cyber analyst team. Week 18  Our purple hatters rate the news by interest and newsworthiness! Is Reddit…

Cyberspresso: Cybersecurity weekly incidents, threats & attacks… grab a coffee, get updated
April 24, 2018

Cybersecurity rants & raves selected by XM Cyber analyst team.  Our purple hat team rate the news by interest and newsworthiness. New ransomware unable…

RSA Conference 2018 Takeaways
April 22, 2018

Trends, technologies and talking points As the RSA conference draws to a close, we’re looking back with red-shot eyes, at the week that was….

Advantages of rethinking from the attacker’s perspective
April 10, 2018

An interview with XM Cyber CEO Noam Erez. “It’s like deploying an army of automated red teams working 24×7 just for you, followed immediately…

What will it take to close the gap between the red team & blue team?
March 29, 2018

And why it’s time to harness the power of purple team automation Modern militaries have been known to galvanize opposing forces during defense-offense exercises…

XM Cyber coming to RSA 2018
March 15, 2018

With over 40,000 attendees anticipated to come this year, RSA promises to be once again, a Mecca for the global cyber security community. Here…

Welcome Blog
March 14, 2018

We are excited to launch our blog and begin an ongoing conversation with you. Although we are officially launching these days, our journey began…

1 36 37 38

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.