Digital Transformation: Enabling Your Defenders to See Like Their Attackers

Digital transformation is a phrase that gets bandied about often enough to almost qualify for the "buzzword" category. Yet scratch below the surface and you'll see a weighty concept that articulates one of the most urgent challenges today's organizations face. Namely, how to keep pace and evolve in a world that is digitalizing at breakneck… Read More »

Create a Resilient Security Posture that Takes the Initiative from Cyber Attackers

Cybersecurity professionals have never had it easy -- but these days the game is definitely being played on expert mode. Threats aren't only increasing in number, they are becoming more diverse and targeted. Machine learning, deepfake technology and false flag cyber-attacks may still be on the margins now, but all could soon create profound new… Read More »

Webinar: How Short is the Path to Your Most Critical Assets?

Join XM Cyber and SecurityScorecard teaming up to demonstrate for you how malicious actors gain access to your network and the ease at which they can exploit external-facing vulnerabilities, gain access to the network, and move laterally until finding their desired targets. When: June 23rd, 2020 Time: 9:00am EDT Gus Evangelakos, Director Field Engineering at… Read More »

Why Identity and Access Management is the New Public Cloud Perimeter

Identity and Access Management (IAM) has become a key security battleground for attackers and defenders. Unfortunately, many defenders not only lack the expertise to fight this battle, but they are also unaware of its importance. Here's the reality: IAM is the new perimeter in the public cloud. By accessing identity, someone outside an organization (or… Read More »

Why Breach and Attack Simulations Are the Keys to a Secure Cloud

Many of today’s businesses are compelled to migrate to the cloud on an accelerated timeline. Unfortunately, this business mandate often forces teams to push forward without fully working through the security considerations. For a prominent example of this phenomenon, look no further than Amazon Web Services (AWS). When firms begin building their infrastructure in AWS,… Read More »