Blogs & Editorials

Stay up to date on cybersecurity

If it seems like the task of vulnerability risk management is growing more difficult by the day, there’s a good reason for that impression. The sheer number of vulnerabilities to manage can overwhelm even a strong security team. With COVID-19 disruptions and an ongoing cybersecurity skills gap complicating matters even further, it’s critical that organizations […]
May 25, 2020
Quickly moving to a remote workforce can easily cause gaps in your security. Criminals are seizing the moment and flooding the internet with fake domains and phishing emails to gain access to your employee’s systems and credentials. XM Cyber can immediately help you identify gaps in security as a result of new work-from-home initiatives.  In […]
Tagged under: , ,
May 20, 2020
It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately, we’ve formulated a simple (and delicious) metaphor for your consumption: A pizza dinner. First, think of conventional on-premises computing as the “at home” version of a pizza dinner. You manage the […]
May 10, 2020
One of the best things about releasing a new product into the wild is discovering all the new, creative and unanticipated ways in which people begin using the product. Sometimes users come up with novel applications that surprise even the most far-sighted product builders and designers. In other cases, they begin extending the value proposition […]
May 4, 2020
Today’s organizations are getting serious about cyber-crime prevention. Rather than keeping security concerns largely compartmentalized, cyber-attack prevention is now seen as a core strategic objective. According to the World Economic Forum’s Global Risks Report 2020, business leaders rank cyber-attacks as the second greatest risk for businesses globally over the next decade. This places it in the […]
April 27, 2020
Julius Caesar famously said, “Experience is the best teacher.” Yet no organization wants to learn by experience when it comes to cloud security breaches. Instead, it’s better to learn from the examples of other organizations that have endured their own cloud data breach incidents. Over the past few years, there has been no shortage of high-profile […]
Tagged under: , ,
April 13, 2020
Almost all of us have been the victim of a friendly April Fool’s joke. You know the setup: We’re led to believe an outrageous premise, the joke is revealed, and everyone has a nice laugh. It’s an enduring annual tradition. It sounds ludicrous, but each year millions of people fall victim to popular April Fool’s […]
Tagged under: ,
April 1, 2020
When we think about data breaches, our minds tend to drift to the spectacular incidents that make national or international news. Yet while they rarely pop up in the press, small and medium-sized enterprises (SMEs) — also known as small and medium-sized businesses (SMBs) — are at even greater risk of a suffering serious breach […]
March 23, 2020
The coronavirus – also known as COVID-19 – has been inescapable lately. What you may not know, however, is that global human health pandemics can also infect the cybersecurity world. For instance, coronavirus-related phishing attempts are on the rise, as hackers seek to exploit the ambient anxiety circulating through society for their own nefarious ends. […]
March 15, 2020
We’ve all heard it stated ad nauseam: Cyber data breaches are continually growing and pose an urgent threat to global business. Yet is that message truly sinking in? Do corporate leaders place a priority on understanding data breaches and their impact? Or are the tools that organizations deploy simply inadequate for the task? In 2019, a landmark event occurred […]
Tagged under: ,
March 8, 2020