What to Expect from the Gartner Security & Risk Summit 2019
Four days of security discussions, over 120 sessions, 60 security analysts and 3,500 attendees. These are just some of the…
Blog
Top Tips for Purple Team Assessment
Until recently, organizations have had limited capabilities for assessing the damage that a cyberattack could do to their critical assets.…
Blog
Top Weekly Cyber News: May 26-31, 2019
Hi folks! You may find below the latest news about global incidents, threats and attacks handpicked by our super XM…
Blog
Top Weekly Cyber News: May 20-25, 2019
Hi folks! You may find below the latest news about global incidents, threats and attacks handpicked by our super XM…
Blog
Key Takeaways from the 2019 Verizon Data Breach Investigations Report
Every year, digital security experts, IT personnel and top executives from various industries look forward to the release of Verizon’s…
Blog
GoT: Game of Threats?
Global organizations are like kingdoms under siege, threatened by “little birds” from all sides. From the outside: persistent targeted attacks…
Blog
Top Weekly Cyber News: May 13-18, 2019
Hi folks! You may find below the latest news about global incidents, threats and attacks handpicked by our super XM…
Blog
Top Weekly Cyber News: May 6-11, 2019
Hi folks! You may find below the latest news about global incidents, threats and attacks handpicked by our super XM…
Blog
Eurovision 2019: Can Your Organization’s Cybersecurity Win ‘Douze Points’?
“Douze Points!” would naturally sound like an amazing compliment to any European organization, meaning it has scored the highest grade…
Blog
Top Weekly Cyber News: April 29-May 4, 2019
Hi folks! You may find below the latest news about global incidents, threats and attacks handpicked by our super XM…
Blog
‘May the Fourth Be with You’ to Protect Your Critical Assets
What better day, May the 4th, to take inspiration from Star Wars as you continuously work hard to be always…
Blog
Top Weekly Cyber News: April 22-27, 2019
Hi folks! You may find below the latest news about global incidents, threats and attacks handpicked by our super XM…
Blog
Request a demo