Blogs & Editorials

Stay up to date on cybersecurity

Why You Need a Cyber Attack Simulation Tool
It’s hardly news to point out that maintaining a strong security posture has never been tougher. Yet how high, truly, are the stakes? Consider this: The average data breach costs organizations roughly $4 million, according to the Ponemon Institute — and could theoretically cost much more Nearly 400,000 new bits of malware are identified daily. […]
Tagged under:
November 24, 2020
Cybercrime is a multi-trillion-dollar annual problem. If you think your organization isn’t large enough to worry about it, think again: Today’s advanced attackers are targeting companies up and down supply chains, attempting to leverage a single weak point into a treasure trove of valuable data. So how does one prevent such an outcome? Conducting cybersecurity risk assessment […]
November 16, 2020
Júntese a XM Cyber en nuestra presentación sobre la simulación de brechas y ataques (beach and attack simulation) para el mercado mexicano de ciberseguridad, que será realizada en línea el 24 de noviembre, a las 11:00-12:30h (GMT-6). Con el apoyo de nuestro socio mexicano, DNS (Delta Network Systems), nuestra charla intitulada Piensa Como un Hacker expondrá […]
November 11, 2020
Hybrid Cloud Security Challenges
Some companies that choose to migrate to the cloud still need to maintain on-premises operations, whether due to compliance mandates or a variety of other reasons. In such scenarios, opting for a hybrid setup is the natural solution. Yet while going hybrid can offer the best of both worlds and ultimately improve an organization’s security […]
Tagged under: , ,
November 9, 2020
Common Targets for Advanced Persistent Threats (APT)
Few things give cybersecurity defenders more anxiety than the prospect of an attack by an Advanced Persistent Threat (APT). Unlike your run-of-the-mill attacker, APTs are often state-sponsored, exceedingly well-resourced and highly capable in terms of technical ability. Many security teams, on the other hand, are understaffed, inadequately resourced and employ workers with varying degrees of competence. […]
November 3, 2020
All members of the Dev community are invited to join XM Cyber’s next Tech Talk webinar and learn from our journey to shift from Monolith to Big Data Stream Processing architecture using Flink. When: November 26, 2020 Time: 12 pm CET Where: Zoom Registration: Click here Yaron Shani (Senior Cyber Security Researcher) and Sophia Morozov […]
October 28, 2020
If you want to understand where your defenses are vulnerable, actively testing those defenses under real-world conditions is invaluable. That’s the principle behind white hat penetration testing, which seeks to identify, exploit and analyze any security gaps within a computing system. “White hats” are similar to ethical hackers, as they attempt to use the tools […]
October 26, 2020
People often wonder whether SSH uses SSL/TLS for traffic encryption. The short answer is NO, even though both protocols have much in common, under the hood SSH has its own transport protocol, independent from SSL. Both of them were created to secure and encrypt traffic between clients and servers (SSL for website traffic, SSH for […]
Tagged under: , ,
October 22, 2020
Penetration tests and red team exercises are, in many ways, two sides of the same coin. Both have similar objectives, and both share some commonalities in terms of how those objectives are achieved. However, they are not interchangeable — and organizations may find one approach better suits their needs, depending on a few variables. To illuminate the […]
October 19, 2020
If you’re a cybersecurity pro, they are the last three letters you want to hear: G-A-P. And it has nothing to do with your jeans. We’re talking about security gaps, which are an unfortunate fact of life and certain to remain so — at least until humans are entirely replaced by AI. People are fallible, which […]
October 13, 2020