Blogs & Editorials

Stay up to date on cybersecurity

What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a vision statement, but a reflection of our reality.  From wearables to smart home systems and routers… Devices with sensors that collect data in real time are rapidly expanding. To many they […]
Tagged under: ,
June 19, 2018
Frost & Sullivan 2018 Best Practices Award, attributed to XM Cyber this month, shines a bright light on the transition to automated and continuous red team – blue team simulation. Here’s a summary of the report’s highlights. The role of manual red and blue teams to date In the enterprise world, human-based siloed red team […]
Tagged under: ,
June 7, 2018
Four days of security discussions, over 120 sessions, 60 security analysts and 3,400 attendees. These are just some of the numbers luring security professionals worldwide to the mecca of all analyst conferences in the security sector. The doors of the Gartner Security Conference this year will be opening on June 4 at the National Harbor, […]
Tagged under:
May 31, 2018
Trend alert: Critical infrastructure attacks on the rise Healthcare sectors, critical manufacturing, food production and transportation are also targets  Although cyber security is treated more seriously, simply upgrading equipment is no longer enough.  So what are some of the steps worth considering? Exposing attack vectors through testing, reviewing the security posture, watching for network probing […]
Tagged under: ,
May 30, 2018
How security auto-testing with actionable remediation could help resolve some problematic GDPR security requirements not met to date. Although the GDPR deadline has just passed, there is no point surrendering to scare mongering tactics. There is still an opening for making necessary security adjustments until the dust settles and the authorities sound their first warning […]
Tagged under:
May 25, 2018
An astounding 200M data sets sold on the Dark Web A Chinese-based hacker group has been selling data of approximately 200 million Japanese users. IDs, passwords and email addresses, extruded from retail and gaming sites, were just some of the information sources up for grabs, according to FireEye iSIGHT. The fee for the entire data […]
Tagged under:
May 21, 2018
Not again! Personal Facebook data at the mercy of an entire researcher community… Personal details from gender to relationship status, status updates and personality scores of millions of users are free game to Cambridge University Academics. Apparently data harvested through the popular Mypersonality app that was used for targeting ads, was shared for free for […]
Tagged under:
May 14, 2018
Weekly rants and raves from cybersecurity’s trenches Modern day thief, with penchant for Cognac, lives lavish life funded by data sold on the Dark Web Self acclaimed Dark Web knight with the online handle of “Courvoisier” was arrested by British Police for hacking over 200 companies  including Apple, Uber, Just Eat and Groupon. Apparently, 26 […]
Tagged under:
May 7, 2018
Why Shadow IT is the oxygen for APTs &  how to contain it? 1st post in series highlighting real life APT attacks examples.  By Shai Mendel, Team leader at XM Cyber Ah, shadow IT errors; so common, yet hidden disasters in the making. In fact Gartner predicts that by 2020, a third of enterprise attacks will […]
Tagged under: , ,
May 6, 2018
Cybersecurity rants and raves selected by XM Cyber analyst team. Week 18  Our purple hatters rate the news by interest and newsworthiness!   Is Reddit still an ‘agent’ of the Dark Web? In an attempt to rebuff a reputation for being a digital ‘Wild West’, Reddit has reportedly banned Dark Net sub-Reddits where drugs, data […]
April 30, 2018