• Platform
    • XM Cyber Platform
  • Solutions
    • Breach and Attack
    • Security Posture Visibility
    • Vulnerability Prioritization Technology
    • Cloud Security Posture Management
  • Use Cases
    • Amazon Web Services (AWS)
    • APT Simulation
    • Red Teams
    • Penetration Testing
    • Mergers & Acquisitions
    • MITRE ATT&CK
    • Executive Oversight
  • Resources
    • Thought Leadership
    • Research
    • Blogs
    • Webinars and Videos
    • Glossary
  • Company
    • About Us
    • News
    • Leadership
    • Press Releases
    • Events
    • Careers
    • Partners
    • Awards
  • Platform
  • XM Cyber Platform
  • Breach and Attack
  • Security Posture Visibility
  • Vulnerability Prioritization Technology
  • Cloud Security Posture Management
  • Amazon Web Services (AWS)
  • APT Simulation
  • Red Teams
  • Penetration Testing
  • Mergers & Acquisitions
  • MITRE ATT&CK
  • Executive Oversight
  • Thought Leadership
  • Research
  • Blogs
  • Webinars and Videos
  • Glossary
  • Company
  • About Us
  • News
  • Leadership
  • Press Releases
  • Events
  • Careers
  • Partners
  • Awards

Free
Trial

Author: Artiom Levinton

How to Grant Least Privileged Permissions to AWS Principles

By Artiom Levinton
Posted on December 7, 2020December 7, 2020
Cat Blog
Convenience vs security — the eternal dilemma… As a part of SecOps or DevOps team, you probably face this dilemma every day >> How to grant a certain user or application precisely the number of permissions they need to run. No more, no less. Principal entities are people or applications that are authenticated using an… Read More »

SSH & SSL — Step-siblings or Rivals?

By Artiom Levinton
Posted on October 22, 2020October 22, 2020
Cat Blog
People often wonder whether SSH uses SSL/TLS for traffic encryption. The short answer is NO, even though both protocols have much in common, under the hood SSH has its own transport protocol, independent from SSL. Both of them were created to secure and encrypt traffic between clients and servers (SSL for website traffic, SSH for… Read More »
Solutions and Platform
Breach and Attack Simulation
Security Posture Visibility
Cloud Security Posture Mngmt
Vulnerability Prioritization
XM Cyber Platform
Use Cases
AWS
APT Simulation
Red Teams
Pen Testing
Merger & Acquisition
MITRE [email protected]
Executive Oversight
Resources
Thought Leadership
Research
Blog
Webinars/Videos
Glossary
About XM Cyber
About Us
Leadership
Press Releases
Locations
Partners
Careers
Tel Aviv +972 3 978 6668
New York +1 866 598 6170
London +44 203 322 3031
Munich +49 163 6288041
[email protected]
© 2020 XM Cyber All Rights Reserved | Privacy Policy | Terms of Use | CCPA