Blogs & Editorials

Stay up to date on cybersecurity

Sometimes our security controls can make us feel confident. Yet other times that confidence can prove to be badly misplaced. Consider the case of a Big Three credit bureau that was victimized by a massive data breach in late 2017. After public alerts were issued identifying a serious vulnerability in a popular web application, this credit […]
June 8, 2020
Join XM Cyber for the virtual event Introducing Automated Purple Teaming, where we will be exploring a new approach to security that is helping large organizations gain the upper hand against hackers and criminal schemes. DATE: Monday, June 8 TIME: 3:00-4:00 pm GMT Summer Time (London, GMT+01:00) Breach and Attack Simulation (BAS), automated pen-testing, Continuous […]
June 7, 2020
If you want to protect a cybersecurity asset, you need to understand how someone is likely to attack it. One person or organization, however, can only learn so much on its own. Yet when organizations join forces and share threat intelligence at a global level, the job of asset protection becomes much easier. That is […]
Tagged under: ,
June 1, 2020
If it seems like the task of vulnerability risk management is growing more difficult by the day, there’s a good reason for that impression. The sheer number of vulnerabilities to manage can overwhelm even a strong security team. With COVID-19 disruptions and an ongoing cybersecurity skills gap complicating matters even further, it’s critical that organizations […]
May 25, 2020
Quickly moving to a remote workforce can easily cause gaps in your security. Criminals are seizing the moment and flooding the internet with fake domains and phishing emails to gain access to your employee’s systems and credentials. XM Cyber can immediately help you identify gaps in security as a result of new work-from-home initiatives.  In […]
Tagged under: , ,
May 20, 2020
It’s not always easy to wrap your mind around the various layers of cloud security and how they differ from conventional on-premises computing. Fortunately, we’ve formulated a simple (and delicious) metaphor for your consumption: A pizza dinner. First, think of conventional on-premises computing as the “at home” version of a pizza dinner. You manage the […]
May 10, 2020
One of the best things about releasing a new product into the wild is discovering all the new, creative and unanticipated ways in which people begin using the product. Sometimes users come up with novel applications that surprise even the most far-sighted product builders and designers. In other cases, they begin extending the value proposition […]
May 4, 2020
Today’s organizations are getting serious about cyber-crime prevention. Rather than keeping security concerns largely compartmentalized, cyber-attack prevention is now seen as a core strategic objective. According to the World Economic Forum’s Global Risks Report 2020, business leaders rank cyber-attacks as the second greatest risk for businesses globally over the next decade. This places it in the […]
April 27, 2020
Julius Caesar famously said, “Experience is the best teacher.” Yet no organization wants to learn by experience when it comes to cloud security breaches. Instead, it’s better to learn from the examples of other organizations that have endured their own cloud data breach incidents. Over the past few years, there has been no shortage of high-profile […]
Tagged under: , ,
April 13, 2020
Almost all of us have been the victim of a friendly April Fool’s joke. You know the setup: We’re led to believe an outrageous premise, the joke is revealed, and everyone has a nice laugh. It’s an enduring annual tradition. It sounds ludicrous, but each year millions of people fall victim to popular April Fool’s […]
Tagged under: ,
April 1, 2020