Join XM Cyber at Black Hat 2019

With an elite community of nearly 20,000 influential security experts, practitioners and business developers from around the world anticipated to come this year, Black Hat promises to be once [...]

How to Combat Advanced Persistent Threats

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection appliances and [...]

Did you just create a paradise for hackers? – Part 2

Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you [...]

How Is Your Enterprise IT Hygiene?

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning [...]

Breach and Attack Simulation – Know Your Enemy

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. [...]

Jiu-Jitsu training and Red/Blue teaming… How are they the same?

I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am I drawing the similarities between these two art forms? Both are [...]

Advantages of rethinking from the attacker’s perspective

An interview with XM Cyber CEO Noam Erez. “It’s like deploying an army of automated red teams working 24×7 just for you, followed immediately by a blue team that prioritizes simple-to-follow [...]

Welcome Blog

We are excited to launch our blog and begin an ongoing conversation with you. Although we are officially launching these days, our journey began almost two years ago with the development of the [...]