Blog

Stay up to date on cybersecurity

BLOG
If you want to protect a valuable asset against threats, it’s essential to identify where vulnerabilities exist. This is a core concept in cybersecurity and part of the daily mission of defenders. Yet the most effective approach for risk and vulnerability management has shifted in parallel with larger changes in computing. The evolving nature of penetration testing is one […]
Most organizations work diligently to constantly manage and evaluate their cybersecurity risk. Typically, vulnerability management processes are implemented, security controls installed, and penetration testing or red team exercises are performed to assess and reduce risk. However, the challenges with these practices remain and generally consist of prioritizing remedial projects, understanding the context of internal network […]
Don’t miss JSCONF.BE 2020, an online JavaScript conference with a strong focus on DevSecOps & Security. The event will be held on June 23 between 9:30 am and 5:00 pm CET (check your own time zone). Tamar Stern, Backend Manager at XM Cyber, will give a talk titled “Intro to Machine Learning in Node.js” between 11:30 […]
If you’re reading this, you’re probably aware of the general idea behind a vulnerability assessment. In the plainest terms, it’s a process undertaken with the aim of identifying and prioritizing vulnerabilities within applications, systems and infrastructures. By following this process, organizations can limit the risks of exposures. Yet that straightforward definition belies a fairly complex […]
Join XM Cyber and SecurityScorecard teaming up to demonstrate for you how malicious actors gain access to your network and the ease at which they can exploit external-facing vulnerabilities, gain access to the network, and move laterally until finding their desired targets. When: June 23rd, 2020 Time: 9:00am EDT Gus Evangelakos, Director Field Engineering at […]
Join XM Cyber for the virtual event Intelligence in the Cyberspace, where our VP Sales for EMEA/APAC, Gil Hazaz, will give a talk on the protection of critical infrastructures from threats that can endanger the safety of organizations. When: 18 June, 2020 Time: 9:00 Mexico | 16:00 Rwanda | 16:00 Germany | 17:00 Tel Aviv […]
Tagged under: , ,
Sometimes our security controls can make us feel confident. Yet other times that confidence can prove to be badly misplaced. Consider the case of a Big Three credit bureau that was victimized by a massive data breach in late 2017. After public alerts were issued identifying a serious vulnerability in a popular web application, this credit […]
Join XM Cyber for the virtual event Introducing Automated Purple Teaming, where we will be exploring a new approach to security that is helping large organizations gain the upper hand against hackers and criminal schemes. DATE: Monday, June 8 TIME: 3:00-4:00 pm GMT Summer Time (London, GMT+01:00) Breach and Attack Simulation (BAS), automated pen-testing, Continuous […]
If you want to protect a cybersecurity asset, you need to understand how someone is likely to attack it. One person or organization, however, can only learn so much on its own. Yet when organizations join forces and share threat intelligence at a global level, the job of asset protection becomes much easier. That is […]
Tagged under: ,
If it seems like the task of vulnerability risk management is growing more difficult by the day, there’s a good reason for that impression. The sheer number of vulnerabilities to manage can overwhelm even a strong security team. With COVID-19 disruptions and an ongoing cybersecurity skills gap complicating matters even further, it’s critical that organizations […]