Stay up to date on cybersecurity

The “New Year’s blog” is an established — if not exactly cherished — tradition in business communication. It’s an opportunity to reflect on the past year and prepare for what lies ahead. This year, however, we at XM Cyber want to get an early jump on our thoughts on cybersecurity for 2021. The latest research […]
Tagged under: , ,
Should We Prioritize Detection or Prevention? The XM Factor Is Needed. In 1736, Benjamin Franklin famously advised fire-threatened Philadelphians that ‚ÄúAn ounce of prevention is worth a pound of cure.‚ÄĚ When considering the recent SolarWinds SUNBURST backdoor attack, which impacted a reported 18,000 United States government agencies and myriad large global corporations, this proverb holds […]
A Cybersecurity Vaccine Exists ‚Äď and It Is 99% Effective. Learn How to Inoculate Your Organization From Attacks in 2021 There’s no sugarcoating it: COVID-19 helped make 2020 a bad year for almost everyone. There is one glaring exception, however — sophisticated hacker collectives. For them, 2020 has been a veritable wonderland of opportunity with […]
Penetration tests have always been a bit of a love/hate proposition for most organizational security teams. On one hand, a thorough and rigorous manual test conducted by an experienced team of testers can uncover deeply hidden vulnerabilities that would otherwise fall through the cracks. On the other hand, such tests can take weeks or months […]
Convenience vs security ‚ÄĒ the eternal dilemma‚Ķ As a part of SecOps or DevOps team, you probably face this dilemma every day >> How to grant a certain user or application precisely the number of permissions they need to run. No more, no less. Principal entities are people or applications that are authenticated using an […]
Tagged under: , ,
Why You Need a Cyber Attack Simulation Tool
It’s hardly news to point out that maintaining a strong security posture has never been tougher. Yet how high, truly, are the stakes? Consider this: The average data breach costs organizations roughly $4 million, according to the Ponemon Institute — and could theoretically cost much more Nearly 400,000 new bits of malware are identified daily. […]
Tagged under:
Cybercrime is a multi-trillion-dollar annual problem. If you think your organization isn’t large enough to worry about it, think again: Today’s advanced attackers are targeting companies up and down supply chains, attempting to leverage a single weak point into a treasure trove of valuable data. So how does one prevent such an¬†outcome?¬†Conducting cybersecurity risk assessment […]
J√ļntese a XM Cyber en nuestra presentaci√≥n sobre la simulaci√≥n de brechas y ataques (beach and attack simulation) para el mercado mexicano de ciberseguridad, que ser√° realizada en l√≠nea el 24 de noviembre, a las 11:00-12:30h (GMT-6). Con el apoyo de nuestro socio mexicano, DNS (Delta Network Systems), nuestra charla intitulada Piensa Como un Hacker¬†expondr√° […]
Hybrid Cloud Security Challenges
Some companies that choose to migrate to the cloud still need to maintain on-premises operations, whether due to compliance mandates or a variety of other reasons. In such scenarios, opting for a hybrid setup is the natural solution. Yet while going hybrid can offer the best of both worlds and ultimately improve an organization’s security […]
Tagged under: , ,
Common Targets for Advanced Persistent Threats (APT)
Few things give cybersecurity defenders more anxiety than the prospect of an attack by an Advanced Persistent Threat (APT). Unlike your run-of-the-mill attacker, APTs are often state-sponsored, exceedingly well-resourced and highly capable in terms of technical ability. Many¬†security teams, on the other hand, are understaffed, inadequately resourced and employ workers with varying degrees of competence. […]