What Are the Different Types of White Hat Penetration Testing?

If you want to understand where your defenses are vulnerable, actively testing those defenses under real-world conditions is invaluable. That’s the principle behind white hat penetration testing, which seeks to identify, exploit and analyze any security gaps within a computing system. “White hats” are similar to ethical hackers, as they attempt to use the tools […]

Penetration Tester vs. Red Team: What’s Right for You?

Penetration tests and red team exercises are, in many ways, two sides of the same coin. Both have similar objectives, and both share some commonalities in terms of how those objectives are achieved. However, they are not interchangeable — and organizations may find one approach better suits their needs, depending on a few variables. To illuminate the […]

New Ways to Use XM Cyber for Remote Home Workers, Red Teamers and Pen Testers

One of the best things about releasing a new product into the wild is discovering all the new, creative and unanticipated ways in which people begin using the product. Sometimes users come up with novel applications that surprise even the most far-sighted product builders and designers. In other cases, they begin extending the value proposition […]

Why a 24/7 Fully Automated Breach and Attack Simulation Platform is Needed to Secure Your Organization’s Critical Assets

Global spending on information security now exceeds $100 billion annually, according to Forbes Magazine. Unfortunately, organizations aren’t getting a great return on their (quite sizable) investments. New, high profile data breaches seem to occur on a near-constant basis, and losses from cyber-attacks have never been larger. It’s estimated that security breaches will result in a […]