Expert Thought Leadership

Enjoy these recent articles from the XM Cyber technical team

———————————

aws

LATERAL MOVEMENT: HOW TO BLOCK IT

When thinking about network lateral movement, it’s best to visualize it as an attacker traversing through a network and hunting for the most valuable items to be found.

Read Here

315x185 support 108

WHY COMPANIES STRUGGLING WITH CLOUD

Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.

Read More

315x185 support 153

MALPROXYING: LEAVE YOUR MALWARE AT HOME

XM Cyber can immediately help you identify gaps in security as a result of new work-from-home initiatives.

Read More

315x185 support 124

WHY IT HYGIENE BECOMES KEY TO PROTECTING YOUR CRITICAL ASSETS

Even the most sophisticated adversaries are using surprisingly unsophisticated means to wreak havoc, meaning that zero-days are being employed less frequently.

Read Here

315x185 support 146

HOW A SOLID CYBER SECURITY STRATEGY HELPS PROTECT YOUR CRITICAL ASSETS

Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.

Read More

315x185 support 185

GAIN VISIBILITY INTO AWS ATTACKS

As more and more data are migrated to the cloud, new risks emerge making it critical for companies to assess their risk posture.

Read More

315x185 support 135

SEVEN KEY FEATURES OF A BREACH AND ATTACK SYSTEM

In order to defeat hackers, it’s imperative to assume their perspective in order to help anticipate their next move.

Read Here

315x185 support 143

WHY IDENTIFY AND ACCESS MANAGEMENT IS THE NEW PUBLIC CLOUD PERIMETER

Identity and Access Management (IAM) has become a key security battleground for attackers and defenders.

Read More

315x185 support 193

A CLOSER LOOK AT CYBER ATTACK SIMULATION

Top-notch hackers can mimic legitimate user actions and go under the radar of protective measures.

Read More

315x185 support 165

WHY BAS IS CRITICAL TO SECURING CRITICAL ASSETS

To cope with unceasing pressure from bad actors, many organizations adopt a posture of “more is better.”

Read Here

315x185 support 154

WHY IS IT SO EASY FOR APTs TO MOVE THROUGH OUR NETWORKS?

despite all the awareness, technology advancements and heavy investment, the fight against advanced persistent threats (APTs) remains a losing battle.

Read More

315x185 support 14

BREACH AND ATTACK SIMULATION VS PEN TESTING

A large number of organizations are coming to see that a proactive security strategy is one of the best defenses.

Read More

315x185 support 142

AUTOMATING THE PURPLE TEAM IN THE FACE OF APTs

he purple team enables both attack and defense to exchange ideas, observations and insights more productively than is possible with the “us vs. them” ethos of the red/blue battles.

Read Here

315x185 support 42

HOW ADVANCED PERSISTENT THREATS WORK

Actors behind APTs create a growing and changing risk to organizations’ financial assets, intellectual property, and reputation by following a continuous process or kill chain

Read More

315x185 support 36

SIMULATING ATTACKS TO SECURE BANKS: TO PROTECT YOUR GREEN, GO PURPLE

Although finance isn’t the industry that’s most often attacked, the cost per attack is much higher than in other sectors.

Read More

315x185 support 178

7 TOP CHALLENGES FOR CHIEF INFORMATION SECURITY OFFICERS IN 2020

Many of the security methods and techniques that have been effective in the past will no longer be helpful to protect your most critical assets.

Read Here

315x185 support 5

FIVE RESOLUTIONS FOR CISOs HEADING INTO 2020

Expect big players who still rely on onprem to develop their own mantra: “Cloud, cloud, cloud.”

Read More

shutterstock_400245586

10 HOT CYBER SECURITY TIPS FOR ANY VACATION

Taking a break from the office? Awesome. But don’t take a break from cybersecurity.

Read More

BE A HACKER.
STOP A HACKER.