How To Choose a Breach and Attack Simulation Solution

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses. BAS solutions represent an emerging market and are directly adjacent to vulnerability assessment, according to Gartner’s Market Guide for Vulnerability Assessment. They are becoming more mainstream and have begun transforming the security testing […]

Infosecurity Europe 2019: XM Cyber to Debut at Europe’s Leading Cybersecurity Event

With over 15,000 attendees anticipated to come this year, Infosecurity Europe promises to be sourcing and knowledge hub for Europe’s information and cybersecurity community. XM Cyber is very excited to make its debut at Infosecurity Europe, where our global team of experts – including our new UK-based staff – will showcase XM Cyber’s newly enhanced platform to […]

How to Combat Advanced Persistent Threats

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection appliances and uses Artificial Intelligence (AI) tools to search for anomalies in network traffic. After six months, during which nothing significant appears to have happened, the organization becomes aware of a […]

Meet Us at FS-ISAC Fall Summit

With thousands attendees from financial institutions anticipated to come this year, FS-ISAC Fall Summit 2018 taking place in Chicago, promises to be once again, an important event for the global cybersecurity community. At XM Cyber, we are particularly excited about this year’s event, as we will be sponsoring the “All Day Cafe” and attending FS-ISAC […]

XM Cyber Honored in 2018 CyberSecurity Breakthrough Award Program

Company Recognized for Innovation in the Advanced Persistent Threat Category in Annual Awards Program XM Cyber, founded by top executives from Israel’s cyber intelligence community and provider of the first fully automated APT (Advanced Persistent Threat) simulation and remediation platform, today announced that it has been selected as the winner of the “Overall APT Solution Provider of […]

How Is Your Enterprise IT Hygiene?

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An IT hygiene definition should start with the meaning of “hygiene,” which comes from the Greek “hygieine techne.” It means “the healthful art,” Enterprise IT Hygiene is crucial if you want to […]

Breach and Attack Simulation – Know Your Enemy

“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle.” ― Sun Tzu, The Art […]

HLS & Cyber Conference – Here We Come!

With over 5,000 attendees from all over the world anticipated to come this year, HLS & Cyber Conference 2018 taking place in Tel Aviv, promises to be once again, an important event for the global cybersecurity community. At XM Cyber, we are particularly excited about this year’s event, as we will be officially attending HLS […]

Jiu-Jitsu training and Red/Blue teaming… How are they the same?

I am super passionate about Jiu-Jitsu and InfoSec. I have been involved in InfoSec for 18 years, and Jiu-Jitsu for 10. So how am I drawing the similarities between these two art forms? Both are based on the concept of – offense and defense.  In Jiu-Jitsu, you need to have a good offense along with […]

All Ahead Full… Bureaucracy: The DoD’s New “Do Not Buy” Software List

Another day, another head scratcher from the DoD regarding cyber security policies. BleepingComputer.com reported on July 30 that the Department of Defense (DOD) has been quietly developing a “Do Not Buy” list of companies known to use Chinese and Russian software in their products.