Webinar: How Short is the Path to Your Most Critical Assets?

Join XM Cyber and SecurityScorecard teaming up to demonstrate for you how malicious actors gain access to your network and the ease at which they can exploit external-facing vulnerabilities, gain access to the network, and move laterally until finding their desired targets. When: June 23rd, 2020 Time: 9:00am EDT Gus Evangelakos, Director Field Engineering at… Read More »

Why Identity and Access Management is the New Public Cloud Perimeter

Identity and Access Management (IAM) has become a key security battleground for attackers and defenders. Unfortunately, many defenders not only lack the expertise to fight this battle, but they are also unaware of its importance. Here's the reality: IAM is the new perimeter in the public cloud. By accessing identity, someone outside an organization (or… Read More »

Why Breach and Attack Simulations Are the Keys to a Secure Cloud

Many of today’s businesses are compelled to migrate to the cloud on an accelerated timeline. Unfortunately, this business mandate often forces teams to push forward without fully working through the security considerations. For a prominent example of this phenomenon, look no further than Amazon Web Services (AWS). When firms begin building their infrastructure in AWS,… Read More »