XM Cyber Expands HaXM Automated Purple Team Platform With New Capabilities and Certifications

Enhanced Platform to be Showcased at RSA Conference 2019 HERZLIYA, Israel, Feb. 20, 2019 /PRNewswire/ -- XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, today unveiled new capabilities and features for its fully automated purple team platform HaXM. XM Cyber has significantly expanded the capabilities of HaXM, which now enables customers to perform real… Read More »

Red Team and Penetration Testing for Corporate Security

How easy is it for a malicious actor to get into your network? Penetration testing seeks to answer this question. Commonly referred to as white hat pentesting, a penetration test detects and exploits vulnerabilities throughout your network and infrastructure. While pentesting overlaps with red team exercises—to the point where some people think the concepts are… Read More »

What is Vulnerability Management ?

[vc_row full_width="stretch_row" equal_height="yes" parallax="content-moving" parallax_image="6286" css=".vc_custom_1592420886597{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 110px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 0px !important;padding-right: 110px !important;padding-bottom: 0px !important;padding-left: 0px !important;}"][vc_column css=".vc_custom_1591211898029{padding-left: 40px !important;}"][vc_row_inner][vc_column_inner width="3/4"][vc_column_text css=".vc_custom_1606250089884{margin-top: 0px !important;border-bottom-width: 0px !important;}"] What is Vulnerability Management? [/vc_column_text][/vc_column_inner][vc_column_inner width="1/4"][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width="1/2"][vc_btn title="Download PDF" style="custom" custom_background="#ff0044" custom_text="#ffffff" shape="square" size="sm" align="left" link="url:http%3A%2F%2Fwww.xmcyber.com%2Fwp-content%2Fuploads%2F2020%2F06%2FHow-Advanced-Persistant-Threat-Works_c.pdf|||"][/vc_column_inner][vc_column_inner… Read More »

What is a Security Control Validation?

[vc_row full_width="stretch_row" equal_height="yes" parallax="content-moving" parallax_image="6286" css=".vc_custom_1592420886597{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 110px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 0px !important;padding-right: 110px !important;padding-bottom: 0px !important;padding-left: 0px !important;}"][vc_column css=".vc_custom_1591211898029{padding-left: 40px !important;}"][vc_row_inner][vc_column_inner width="3/4"][vc_column_text css=".vc_custom_1606249248995{margin-top: 0px !important;border-bottom-width: 0px !important;}"] What is a Security Control Validation? [/vc_column_text][/vc_column_inner][vc_column_inner width="1/4"][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width="1/2"][vc_btn title="Download PDF" style="custom" custom_background="#ff0044" custom_text="#ffffff" shape="square" size="sm"… Read More »

What is a Penetration Test?

[vc_row full_width="stretch_row" equal_height="yes" parallax="content-moving" parallax_image="6286" css=".vc_custom_1592420886597{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 110px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 0px !important;padding-right: 110px !important;padding-bottom: 0px !important;padding-left: 0px !important;}"][vc_column css=".vc_custom_1591211898029{padding-left: 40px !important;}"][vc_row_inner][vc_column_inner width="3/4"][vc_column_text css=".vc_custom_1606247745162{margin-top: 0px !important;border-bottom-width: 0px !important;}"] What is a Penetration Test? [/vc_column_text][/vc_column_inner][vc_column_inner width="1/4"][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width="1/2"][vc_btn title="Download PDF" style="custom" custom_background="#ff0044" custom_text="#ffffff" shape="square" size="sm" align="left"… Read More »

What is MITRE ATT&CK Framework?

[vc_row full_width="stretch_row" equal_height="yes" parallax="content-moving" parallax_image="6286" css=".vc_custom_1592420886597{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 110px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 0px !important;padding-right: 110px !important;padding-bottom: 0px !important;padding-left: 0px !important;}"][vc_column css=".vc_custom_1591211898029{padding-left: 40px !important;}"][vc_row_inner][vc_column_inner width="3/4"][vc_column_text css=".vc_custom_1606256208482{margin-top: 0px !important;border-bottom-width: 0px !important;}"] What is MITRE ATT&CK Framework? [/vc_column_text][/vc_column_inner][vc_column_inner width="1/4"][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width="1/2"][vc_btn title="Download PDF" style="custom" custom_background="#ff0044" custom_text="#ffffff" shape="square" size="sm" align="left"… Read More »

What is a Cyber Attack Modeling?

[vc_row full_width="stretch_row" equal_height="yes" parallax="content-moving" parallax_image="6286" css=".vc_custom_1592420886597{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 110px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 0px !important;padding-right: 110px !important;padding-bottom: 0px !important;padding-left: 0px !important;}"][vc_column css=".vc_custom_1591211898029{padding-left: 40px !important;}"][vc_row_inner][vc_column_inner width="3/4"][vc_column_text css=".vc_custom_1606151631169{margin-top: 0px !important;border-bottom-width: 0px !important;}"] What is Cyber Attack Modeling? [/vc_column_text][/vc_column_inner][vc_column_inner width="1/4"][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width="1/2"][vc_btn title="Download PDF" style="custom" custom_background="#ff0044" custom_text="#ffffff" shape="square" size="sm" align="left"… Read More »

What is a Cloud Security Posture Management?

[vc_row full_width="stretch_row" equal_height="yes" parallax="content-moving" parallax_image="6286" css=".vc_custom_1592420886597{margin-top: 0px !important;margin-right: 0px !important;margin-bottom: 0px !important;margin-left: 110px !important;border-top-width: 0px !important;border-right-width: 0px !important;border-bottom-width: 0px !important;border-left-width: 0px !important;padding-top: 0px !important;padding-right: 110px !important;padding-bottom: 0px !important;padding-left: 0px !important;}"][vc_column css=".vc_custom_1591211898029{padding-left: 40px !important;}"][vc_row_inner][vc_column_inner width="3/4"][vc_column_text css=".vc_custom_1606255500918{margin-top: 0px !important;border-bottom-width: 0px !important;}"] What is Cloud Security Posture Management? [/vc_column_text][/vc_column_inner][vc_column_inner width="1/4"][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width="1/2"][vc_btn title="Download PDF" style="custom" custom_background="#ff0044" custom_text="#ffffff" shape="square" size="sm"… Read More »