Blog

Stay up to date on cybersecurity

BLOG
Sisyphus, a famous king from Greek mythology, was known for being crafty. He cleverly used deceit and trickery to twice cheat death. Zeus and the rest of the gods, however, were not amused. They decided to punish Sisyphus by forcing him to roll a boulder up a hill. Every time Sisyphus neared the top, the […]
Here‚Äôs something that should send a shiver down the spine of cybersecurity professionals and business leaders: The odds say that your organization will be victimized by a ransomware attack in the next 12 months. In 2021, the global ransomware victimization rate for businesses reached 68.5-percent, according to Statista. This is the highest figure in history. […]
Double extortion ransomware attacks are now one of cybersecurity’s most pressing threats. Read this to learn how organizations can make the right moves to protect their most sensitive assets. Ransomware attacks have long been viewed as a worst-case cybersecurity scenario for organizational leaders. Sadly, that doomsday scenario is now becoming reality with alarming frequency.¬†In 2021, […]
By providing critical attack-centric context, XM Cyber helps extend the power of Tenable‚Äôs cyber exposure platform Like peanut butter and jelly, some things are good in isolation but great when they are combined. In the world of cybersecurity, joining the power of two advanced technologies together often delivers similar improvements. By integrating one platform into […]
If you aren’t worried about ransomware, you should be. And if you are worried, you probably are not worried enough. According to Verizon’s 2021 Data Breach Investigation Report, ransomware attacks have doubled in the last 12 months.¬†Cybercrime Magazine, meanwhile, predicts that a new ransomware attack will occur every 11 seconds in 2021, with global financial […]
Tagged under: ,
The asymmetrical nature of cybersecurity (defenders need to be perfect, attackers only need to be right once) makes the job of critical data asset protection a tough one. Sadly, many organizations make this task even¬†more¬†difficult by unwittingly giving hackers the “keys to the kingdom.” Despite spending precious time and resources trying to stave off attacks, […]
No three words send shivers down the spine of cybersecurity leaders more than “successful ransomware attack.” This is for good reason — few cyber-crimes possess the same power to utterly paralyze business operations and force victims into a situation where the optimal outcome is usually the “least terrible” one. Here’s the bad news: According to […]
Every CISO wants the peace of mind that comes with having full faith in your security posture. The icing on this cake? Having the ability to easily and powerfully justify this feeling of confidence to board members. Unfortunately, the above scenario seems like an out-of-reach fantasy for too many IT leaders, who find themselves besieged […]
Tagged under:
Click here to watch the webinar held by XM Cyber and ThreatConnect and learn about our truly innovative solution to turn the tables on hackers through a risk-based approach to cybersecurity. In this session, we will share how together we can: Help organizations understand their threat landscape Utilize threat intelligence and continuous attack simulation Automate […]
Tagged under: , ,
Were you to tell anyone that cloud computing is growing, a “thanks Captain Obvious” retort is likely quick to follow. Anyone with a passing familiarity with technology knows that cloud computing is ascendant. Yet the scale of this shift is not always fully appreciated. It’s projected that the cloud industry will double in size between […]
Tagged under: ,