Key Takeaways from the 2019 Verizon Data Breach Investigations Report

Every year, digital security experts, IT personnel and top executives from various industries look forward to the release of Verizon’s data-rich and analytical security report, which many consider to be the annual breach bible for the industry. The 2019 Verizon Data Breach Investigation Report has just been released. For me, the DBIR provides some of… Read More »

Logicalis Selects XM Cyber to Power New Purple Team Offering

XM Cyber to Demonstrate HaXM Platform at Infosecurity Europe 2019 LONDON, May 22, 2019 /PRNewswire/ --  XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, and Logicalis, a leading provider of global IT solutions and managed services, today announced that XM Cyber's platform HaXM will power Logicalis' new Purple Teaming Service. The partnership will initially focus on the United… Read More »

Three key takeaways from the 2019 Verizon Data Breach Investigations Report

XMCyber's Menachem Shafran helps you take advantage of the 2019 Verizon Data Breach Investigations Report. Every year, digital security experts, IT personnel and top executives from various industries look forward to the release of Verizon’s data-rich and analytical security report, which many consider to be the annual breach bible for the industry. Read More »

Logicalis Selects XM Cyber to Power New Purple Team Offering

XM Cyber to Demonstrate HaXM Platform at Infosecurity Europe 2019 LONDON, May 22, 2019 /PRNewswire/ --  XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, and Logicalis, a leading provider of global IT solutions and managed services, today announced that XM Cyber's platform HaXM will power Logicalis' new Purple Teaming Service. The partnership will initially focus on the United… Read More »

GoT: Game of Threats?

Global organizations are like kingdoms under siege, threatened by “little birds” from all sides. From the outside: persistent targeted attacks are becoming increasingly sophisticated and dangerous while some adversaries are using surprisingly unsophisticated means to wreak damage. From the inside, employees are partaking in risky poor IT hygiene activities that put the entire organization at… Read More »