How to Combat Advanced Persistent Threats

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection appliances and [...]

Meet Us at FS-ISAC Fall Summit

With thousands attendees from financial institutions anticipated to come this year, FS-ISAC Fall Summit 2018 taking place in Chicago, promises to be once again, an important event for the global [...]

XM Cyber Honored in 2018 CyberSecurity Breakthrough Award Program

Company Recognized for Innovation in the Advanced Persistent Threat Category in Annual Awards Program XM Cyber, founded by top executives from Israel’s cyber intelligence community and [...]

How Is Your Enterprise IT Hygiene?

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning [...]

Breach and Attack Simulation – Know Your Enemy

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. [...]

HLS & Cyber Conference – Here We Come!

With over 5,000 attendees from all over the world anticipated to come this year, HLS & Cyber Conference 2018 taking place in Tel Aviv, promises to be once again, an important event for the [...]

Jiu-Jitsu training and Red/Blue teaming… How are they the same?

I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am I drawing the similarities between these two art forms? Both are [...]

page 1 of 2