Blogs & Editorials

Stay up to date on cybersecurity

How easy is it for a malicious actor to get into your network? Penetration testing seeks to answer this question. Commonly referred to as white hat pentesting, a penetration test detects and exploits vulnerabilities throughout your network and infrastructure. While pentesting overlaps with red team exercises—to the point where some people think the concepts are […]
Tagged under:
October 24, 2018
With thousands attendees from financial institutions anticipated to come this year, FS-ISAC Fall Summit 2018 taking place in Chicago, promises to be once again, an important event for the global cybersecurity community. At XM Cyber, we are particularly excited about this year’s event, as we will be sponsoring the “All Day Cafe” and attending FS-ISAC […]
October 18, 2018
APT38 has hit the news wires on several different feeds, they outline what this group has done and how it was able to accomplish several multi million dollar heists, and continue to pose a threat moving forward. But what is at the core of this APT?  And how do we defend against this group and […]
October 11, 2018
Why Shadow IT is the oxygen supply for APTs & what can you do to cut it off? The Use Case of Reverse RDP This is the second post of the series highlighting real life APT attacks examples (you can find the first post here). This post covers another real-life scenario we have experienced at one […]
October 4, 2018
Advanced Persistent Threats (APTs) put intolerable pressure on enterprise cybersecurity countermeasures. Generally reactive in nature, today’s standard cybersecurity controls are overly reliant on detecting and responding to immediate incidents. This approach may be suitable for some attacks, but it does not work well with slow-moving, stealthy APTs. For better defense, enterprises are starting to turn […]
October 2, 2018
Company Recognized for Innovation in the Advanced Persistent Threat Category in Annual Awards Program XM Cyber, founded by top executives from Israel’s cyber intelligence community and provider of the first fully automated APT (Advanced Persistent Threat) simulation and remediation platform, today announced that it has been selected as the winner of the “Overall APT Solution Provider of […]
September 27, 2018
We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning of “hygiene,” which comes from the Greek “hygieine techne.” It means “the healthful art,” Enterprise IT Hygiene is crucial if you want to […]
September 24, 2018
“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art […]
September 17, 2018
With over 5,000 attendees from all over the world anticipated to come this year, HLS & Cyber Conference 2018 taking place in Tel Aviv, promises to be once again, an important event for the global cybersecurity community. At XM Cyber, we are particularly excited about this year’s event, as we will be officially attending HLS […]
September 7, 2018
I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am I drawing the similarities between these two art forms? Both are based on the concept of – offense and defense.  In Jiu-Jitsu, you need to have a good offense along with […]
September 4, 2018