Blogs & Editorials

Stay up to date on cybersecurity

Cybersecurity has never been an easy game to play, but the difficulty curve has certainly risen sharply in recent years. Adversaries with limited resources and skills can find thousands of attack tools for sale in online markets. Meanwhile, state-sponsored Advanced Persistent Threats are more sophisticated and dangerous than ever, with their ability to penetrate networks, […]
Tagged under: ,
August 18, 2020
All Backend developers and other members of the Dev community are invited for XM Cyber’s next live webinar Backend Talks With XM Cyber. Date: Tuesday, August 18, 3 pm (Israel time) Registration: click here. After you attend this session with our specialists, you will: Add a cool new ability to your Node.js coding skills Learn […]
August 5, 2020
When it comes to having an effective security posture, it often boils down to three words: Reactive or proactive? Let’s take a closer look at why this distinction is so critical — and five things you can do to ensure that your security posture assessment is a positive one. REACTIVE OR PROACTIVE AND WHY IT MATTERS There […]
July 20, 2020
Read what Tomer Teller, Principal Security PM Lead – Threat & Vulnerability Management at Microsoft, wrote about Microsoft’s partnership with XM Cyber. “Our newest partner, XM Cyber, a breach and attack simulation and security posture management solution provider, integrates with Microsoft Defender ATP and threat and vulnerability management to help customers see how an attacker moves laterally and […]
Tagged under: ,
July 16, 2020
If you want to protect a valuable asset against threats, it’s essential to identify where vulnerabilities exist. This is a core concept in cybersecurity and part of the daily mission of defenders. Yet the most effective approach for risk and vulnerability management has shifted in parallel with larger changes in computing. The evolving nature of penetration testing is one […]
July 13, 2020
Most organizations work diligently to constantly manage and evaluate their cybersecurity risk. Typically, vulnerability management processes are implemented, security controls installed, and penetration testing or red team exercises are performed to assess and reduce risk. However, the challenges with these practices remain and generally consist of prioritizing remedial projects, understanding the context of internal network […]
June 22, 2020
Don’t miss JSCONF.BE 2020, an online JavaScript conference with a strong focus on DevSecOps & Security. The event will be held on June 23 between 9:30 am and 5:00 pm CET (check your own time zone). Tamar Stern, Backend Manager at XM Cyber, will give a talk titled “Intro to Machine Learning in Node.js” between 11:30 […]
June 17, 2020
If you’re reading this, you’re probably aware of the general idea behind a vulnerability assessment. In the plainest terms, it’s a process undertaken with the aim of identifying and prioritizing vulnerabilities within applications, systems and infrastructures. By following this process, organizations can limit the risks of exposures. Yet that straightforward definition belies a fairly complex […]
June 15, 2020
Join XM Cyber and SecurityScorecard teaming up to demonstrate for you how malicious actors gain access to your network and the ease at which they can exploit external-facing vulnerabilities, gain access to the network, and move laterally until finding their desired targets. When: June 23rd, 2020 Time: 9:00am EDT Gus Evangelakos, Director Field Engineering at […]
June 11, 2020
Join XM Cyber for the virtual event Intelligence in the Cyberspace, where our VP Sales for EMEA/APAC, Gil Hazaz, will give a talk on the protection of critical infrastructures from threats that can endanger the safety of organizations. When: 18 June, 2020 Time: 9:00 Mexico | 16:00 Rwanda | 16:00 Germany | 17:00 Tel Aviv […]
Tagged under: , ,
June 9, 2020