New Ways to Use XM Cyber for Remote Home Workers, Red Teamers and Pen Testers

One of the best things about releasing a new product into the wild is discovering all the new, creative and unanticipated ways in which people begin using the product. Sometimes users come up with novel applications that surprise even the most far-sighted product builders and designers. In other cases, they begin extending the value proposition… Read More »

Why a 24/7 Fully Automated Breach and Attack Simulation Platform is Needed to Secure Your Organization’s Critical Assets

Global spending on information security now exceeds $100 billion annually, according to Forbes Magazine. Unfortunately, organizations aren't getting a great return on their (quite sizable) investments. New, high profile data breaches seem to occur on a near-constant basis, and losses from cyber-attacks have never been larger. It's estimated that security breaches will result in a… Read More »

How to Make Automated Penetration Testing More Reliable

The modern security landscape is fast evolving -- and has never been more fraught with challenges. With data breaches growing in size and severity every year, and enterprise networks becoming ever more complex, it's imperative for organizations to have a robust set of defenses. Red team exercises and penetration testing have long been core elements of any security strategy. A… Read More »

Join XM Cyber at Black Hat 2019

With an elite community of nearly 20,000 influential security experts, practitioners and business developers from around the world anticipated to come this year, Black Hat promises to be once again a Mecca for the global cyber world. At XM Cyber, we are particularly excited about this year’s event, as we will be officially attending it as… Read More »

How to Combat Advanced Persistent Threats

Imagine the following Security Operations (SecOps) scenario. A large organization conducts regular audits of its security controls. It monitors a collection of intrusion detection appliances and uses Artificial Intelligence (AI) tools to search for anomalies in network traffic. After six months, during which nothing significant appears to have happened, the organization becomes aware of a… Read More »