Blog

Stay up to date on cybersecurity

BLOG
XM Cyber welcomes you to the IT Security Insights 2020 event on October 13. Due the COVID-19 pandemic, the event’s fourth annual edition will be partly online and partly hosted in Stockholm, where participants can attend the conference in person. “Come meet us and learn more about our attack simulation platform that helps protect an organization’s […]
The modern cybersecurity battleground is delivering a new level of challenges for commercial enterprises and governmental institutions. Both entities are discovering the process of protecting and securing their most critical assets has become more difficult and complex. This translates to higher financial costs, greater risk from serious national security threats and even the specter of […]
Tagged under:
It’s been said that measuring something is the first step toward understanding, controlling and improving it. In the case of cybersecurity, that maxim finds its purest expression in the practice of risk assessments. These tools, also sometimes called audits, are a critical step toward maintaining an effective security posture — and one that remains in a state […]
Tagged under: ,
All Backend developers and other members of the Dev community are invited for the International JavaScript Conference on September 2-4. Due the COVID-19 pandemic, this year’s edition will be online. Tamar Twena, XM Cyber’s Backend Team Leader, will be your host at two talks: Implement Event Sourcing in Node.js Friday, September 4 2020 10:00 – […]
Cybersecurity professionals have never had it easy — but these days the game is definitely being played on expert mode. Threats aren’t only increasing in number, they are becoming more diverse and targeted. Machine learning, deepfake technology and false flag cyber-attacks may still be on the margins now, but all could soon create profound new […]
Common Types of APT Attack Vectors 
In the world of cybersecurity, few things send shudders down the spines of defenders like the words Advanced Persistent Threat (APT). The idea of being breached by a sophisticated APT is something close to a worst-case scenario. To help you understand why APTs are such a significant concern, let’s dive into what they are, how […]
Tagged under: ,
Cybersecurity has never been an easy game to play, but the difficulty curve has certainly risen sharply in recent years. Adversaries with limited resources and skills can find thousands of attack tools for sale in online markets. Meanwhile, state-sponsored Advanced Persistent Threats are more sophisticated and dangerous than ever, with their ability to penetrate networks, […]
Tagged under: ,
All Backend developers and other members of the Dev community are invited for XM Cyber’s next live webinar Backend Talks With XM Cyber. Date: Tuesday, August 18, 3 pm (Israel time) Registration: click here. After you attend this session with our specialists, you will: Add a cool new ability to your Node.js coding skills Learn […]
When it comes to having an effective security posture, it often boils down to three words: Reactive or proactive? Let’s take a closer look at why this distinction is so critical — and five things you can do to ensure that your security posture assessment is a positive one. REACTIVE OR PROACTIVE AND WHY IT MATTERS There […]
Read what Tomer Teller, Principal Security PM Lead – Threat & Vulnerability Management at Microsoft, wrote about Microsoft’s partnership with XM Cyber. “Our newest partner, XM Cyber, a breach and attack simulation and security posture management solution provider, integrates with Microsoft Defender ATP and threat and vulnerability management to help customers see how an attacker moves laterally and […]
Tagged under: ,