Newsroom

Topics

Cybersecurity Is Not a Job for Humans

Is artificial intelligence better suited than humans to keeping our networks safe? Keeping our networks secure from hackers is becoming too big a job for…

Product Review by SC Media – HaXM by XM Cyber

HaXM is a substantive effort by XM Cyber to be among the forefront of advanced persistent threat (APT) simulation platforms that continuously expose all…

Black Hat 2018: Attack Simulation

Inspector Clouseau, of Pink Panther fame, had Cato Fong, his manservant, attack him by surprise to keep his self-defense reflexes strong. (And funny) Businesses…

XM Cyber Fights Hackers With An Automated Red Team

Automation and artificial intelligence: two technologies that are key in cybersecurity today. Just ask XM Cyber, one of the latest cybersecurity startups to hit…

AI-Augmented Security: Can Cyberattackers Counter It?

XM Cyber’s Adi Ashkenazy on the Latest Trends

All Ahead Full… Bureaucracy: The DoD’s New “Do Not Buy” Software List

Another day, another head scratcher from the DoD regarding cyber security policies. BleepingComputer.com reported on July 30 that the Department of Defense (DOD) has been quietly…

XM Cyber Recognized in Two Gartner Cybersecurity Reports

Named in “Market Guide for Vulnerability Assessment” and “Hype Cycle for Threat-Facing Technologies, 2018” HERZLIYA, Israel, July 31, 2018 /PRNewswire/ — XM Cyber, provider of the first fully…

XM Cyber Recognized in Two Gartner Cybersecurity Reports

Named in “Market Guide for Vulnerability Assessment” and  “Hype Cycle for Threat-Facing Technologies, 2018”

Interview of Adi Ashkenazy, VP Product at XM Cyber, on Cyber Defense TV

Adi Ashkenazy, VP Product at XM Cyber, is talking on Cyber Defense TV about Advanced Persistent Threats simulation and remediation to always stay ahead…

These are the 61 most innovative startups in the world

Innovation doesn’t just belong to Silicon Valley — it comes from everywhere. That’s the message from the World Economic Forum sent with its annual…

How Does IoT Expand Hackers’ Attack Surface?

What constitutes a weak link? And what can be done to mitigate growing threats via IoT?

1 22 23 24 25 26 27

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.