Resources

Topics

Cyberspresso: Weekly incidents, threats & attacks… grab a coffee, get updated
Blog

Weekly rants and raves from cybersecurity’s trenches Modern day thief, with penchant for Cognac, lives lavish life funded by data sold on the Dark…

Did you just create a paradise for hackers?
Blog

Why Shadow IT is the oxygen for APTs &  how to contain it? 1st post in series highlighting real life APT attacks examples.  By…

Cyberspresso now: Weekly security incidents, threats & attacks… Grab a coffee, get updated
Blog

Cybersecurity rants and raves selected by XM Cyber analyst team. Week 18  Our purple hatters rate the news by interest and newsworthiness!   Is…

Cyberspresso: Cybersecurity weekly incidents, threats & attacks… grab a coffee, get updated
Blog

Cybersecurity rants & raves selected by XM Cyber analyst team.  Our purple hat team rate the news by interest and newsworthiness.   New ransomware…

RSA Conference 2018 Takeaways
Blog

Trends, technologies and talking points As the RSA conference draws to a close, we’re looking back with red-shot eyes, at the week that was….

Advantages of rethinking from the attacker’s perspective
Blog

An interview with XM Cyber CEO Noam Erez. “It’s like deploying an army of automated red teams working 24×7 just for you, followed immediately…

What will it take to close the gap between the red team & blue team?
Blog

And why it’s time to harness the power of purple team automation Modern militaries have been known to galvanize opposing forces during defense-offense exercises…

XM Cyber coming to RSA 2018
Blog

With over 40,000 attendees anticipated to come this year, RSA promises to be once again, a Mecca for the global cyber security community. Here…

Welcome Blog
Blog

We are excited to launch our blog and begin an ongoing conversation with you. Although we are officially launching these days, our journey began…

1 23 24 25

See all ways we can help you

See what attackers see, so you can stop them from doing what attackers do.