Blog

Stay up to date on cybersecurity

BLOG
With over 20,000 attendees anticipated to come this year, Black Hat promises to be once again, a Mecca for the global cyber security community. At XM Cyber, we are particularly excited about this year’s event, as we will be officially attending Black Hat as a company for the first time. Our much-anticipated participation comes three […]
Tagged under:
Meet us in Black Hat, in the Innovation City, Booth IC 2233. Schedule a meeting.
Tagged under:
Cyber security has a major problem: In the current cyber arms race, it takes far more resources to defend against a cyber-attack than it does to create one. The problem with the arms race narrative is the series of dangerous questions that follow suit: Will hackers always have the upper hand? Are they capable of […]
Tagged under:
Why forgetting to change a FPT default password cost the US military dearly. A hacker is selling sensitive US military documents online tracked down via Shodan. Sensitive information on military drones, explosive devices and tank details are just some of the data up for sale. The typical shadow IT attack event could have easily been prevented […]
Tagged under:
What constitutes a weak link? And what can be done to mitigate growing threats via IoT? IoT technology everywhere. No this is not a vision statement, but a reflection of our reality.  From wearables to smart home systems and routers… Devices with sensors that collect data in real time are rapidly expanding. To many they […]
Tagged under: ,
Frost & Sullivan 2018 Best Practices Award, attributed to XM Cyber this month, shines a bright light on the transition to automated and continuous red team – blue team simulation. Here’s a summary of the report’s highlights. The role of manual red and blue teams to date In the enterprise world, human-based siloed red team […]
Tagged under: ,
Four days of security discussions, over 120 sessions, 60 security analysts and 3,400 attendees. These are just some of the numbers luring security professionals worldwide to the mecca of all analyst conferences in the security sector. The doors of the Gartner Security Conference this year will be opening on June 4 at the National Harbor, […]
Tagged under:
Trend alert: Critical infrastructure attacks on the rise Healthcare sectors, critical manufacturing, food production and transportation are also targets  Although cyber security is treated more seriously, simply upgrading equipment is no longer enough.  So what are some of the steps worth considering? Exposing attack vectors through testing, reviewing the security posture, watching for network probing […]
Tagged under: ,
How security auto-testing with actionable remediation could help resolve some problematic GDPR security requirements not met to date. Although the GDPR deadline has just passed, there is no point surrendering to scare mongering tactics. There is still an opening for making necessary security adjustments until the dust settles and the authorities sound their first warning […]
Tagged under:
An astounding 200M data sets sold on the Dark Web A Chinese-based hacker group has been selling data of approximately 200 million Japanese users. IDs, passwords and email addresses, extruded from retail and gaming sites, were just some of the information sources up for grabs, according to FireEye iSIGHT. The fee for the entire data […]
Tagged under: