Blogs & Editorials

Stay up to date on cybersecurity

Cybercrime is obstructing business and governments worldwide. No longer just an IT problem, it is the biggest threat to organizations’ reputation and business continuity. Research shows 54% of organizations experienced one or more attacks that compromised data or their infrastructure, and only a third of organizations believe they have adequate resources to manage security effectively. […]
August 16, 2018
Finally,  your much-deserved summer vacation is about to commence. You and your colleagues prepared your office for downtime,  managed last-minute tasks and set up your automatic reply. So, what’s missing? Cyber threats on the way while you’re away Although you may be on vacation, many cybercriminals are unlikely to take summer breaks. Why should they? […]
August 5, 2018
With over 20,000 attendees anticipated to come this year, Black Hat promises to be once again, a Mecca for the global cyber security community. At XM Cyber, we are particularly excited about this year’s event, as we will be officially attending Black Hat as a company for the first time. Our much-anticipated participation comes three […]
Tagged under:
August 2, 2018
Meet us in Black Hat, in the Innovation City, Booth IC 2233. Schedule a meeting.
Tagged under:
August 2, 2018
Cyber security has a major problem: In the current cyber arms race, it takes far more resources to defend against a cyber-attack than it does to create one. The problem with the arms race narrative is the series of dangerous questions that follow suit: Will hackers always have the upper hand? Are they capable of […]
Tagged under:
July 24, 2018
Why forgetting to change a FPT default password cost the US military dearly. A hacker is selling sensitive US military documents online tracked down via Shodan. Sensitive information on military drones, explosive devices and tank details are just some of the data up for sale. The typical shadow IT attack event could have easily been prevented […]
Tagged under:
July 11, 2018
What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a vision statement, but a reflection of our reality.  From wearables to smart home systems and routers… Devices with sensors that collect data in real time are rapidly expanding. To many they […]
Tagged under: ,
June 19, 2018
Frost & Sullivan 2018 Best Practices Award, attributed to XM Cyber this month, shines a bright light on the transition to automated and continuous red team – blue team simulation. Here’s a summary of the report’s highlights. The role of manual red and blue teams to date In the enterprise world, human-based siloed red team […]
Tagged under: ,
June 7, 2018
Four days of security discussions, over 120 sessions, 60 security analysts and 3,400 attendees. These are just some of the numbers luring security professionals worldwide to the mecca of all analyst conferences in the security sector. The doors of the Gartner Security Conference this year will be opening on June 4 at the National Harbor, […]
Tagged under:
May 31, 2018
Trend alert: Critical infrastructure attacks on the rise Healthcare sectors, critical manufacturing, food production and transportation are also targets  Although cyber security is treated more seriously, simply upgrading equipment is no longer enough.  So what are some of the steps worth considering? Exposing attack vectors through testing, reviewing the security posture, watching for network probing […]
Tagged under: ,
May 30, 2018