Blog

Stay up to date on cybersecurity

BLOG
A Cybersecurity Vaccine Exists ‚Äď and It Is 99% Effective. Learn How to Inoculate Your Organization From Attacks in 2021 There’s no sugarcoating it: COVID-19 helped make 2020 a bad year for almost everyone. There is one glaring exception, however — sophisticated hacker collectives. For them, 2020 has been a veritable wonderland of opportunity with […]
Penetration tests have always been a bit of a love/hate proposition for most organizational security teams. On one hand, a thorough and rigorous manual test conducted by an experienced team of testers can uncover deeply hidden vulnerabilities that would otherwise fall through the cracks. On the other hand, such tests can take weeks or months […]
Convenience vs security ‚ÄĒ the eternal dilemma‚Ķ As a part of SecOps or DevOps team, you probably face this dilemma every day >> How to grant a certain user or application precisely the number of permissions they need to run. No more, no less. Principal entities are people or applications that are authenticated using an […]
Tagged under: , ,
Why You Need a Cyber Attack Simulation Tool
It’s hardly news to point out that maintaining a strong security posture has never been tougher. Yet how high, truly, are the stakes? Consider this: The average data breach costs organizations roughly $4 million, according to the Ponemon Institute — and could theoretically cost much more Nearly 400,000 new bits of malware are identified daily. […]
Tagged under:
Cybercrime is a multi-trillion-dollar annual problem. If you think your organization isn’t large enough to worry about it, think again: Today’s advanced attackers are targeting companies up and down supply chains, attempting to leverage a single weak point into a treasure trove of valuable data. So how does one prevent such an¬†outcome?¬†Conducting cybersecurity risk assessment […]
J√ļntese a XM Cyber en nuestra presentaci√≥n sobre la simulaci√≥n de brechas y ataques (beach and attack simulation) para el mercado mexicano de ciberseguridad, que ser√° realizada en l√≠nea el 24 de noviembre, a las 11:00-12:30h (GMT-6). Con el apoyo de nuestro socio mexicano, DNS (Delta Network Systems), nuestra charla intitulada Piensa Como un Hacker¬†expondr√° […]
Hybrid Cloud Security Challenges
Some companies that choose to migrate to the cloud still need to maintain on-premises operations, whether due to compliance mandates or a variety of other reasons. In such scenarios, opting for a hybrid setup is the natural solution. Yet while going hybrid can offer the best of both worlds and ultimately improve an organization’s security […]
Tagged under: , ,
Common Targets for Advanced Persistent Threats (APT)
Few things give cybersecurity defenders more anxiety than the prospect of an attack by an Advanced Persistent Threat (APT). Unlike your run-of-the-mill attacker, APTs are often state-sponsored, exceedingly well-resourced and highly capable in terms of technical ability. Many¬†security teams, on the other hand, are understaffed, inadequately resourced and employ workers with varying degrees of competence. […]
All members of the Dev community are invited to join XM Cyber‚Äôs next Tech Talk webinar and learn from our journey to shift from Monolith to Big Data Stream Processing architecture using Flink. When: November 26, 2020 Time: 12 pm CET Where: Zoom Registration: Click here Yaron Shani (Senior Cyber Security Researcher) and Sophia Morozov […]
If you want to understand where your defenses are vulnerable, actively testing those defenses under real-world conditions is invaluable. That’s the principle behind white hat penetration testing, which seeks to identify, exploit and analyze any security gaps within a computing system. “White hats” are similar to ethical hackers, as they attempt to use the tools […]