Preparing The Secure Enterprise By Becoming Your Enemy
Addressing The Challenges Of Securing Dynamic Systems And Networks
The hidden reason why companies are struggling to secure cloud infrastructure
Misunderstanding the public cloud comes with grave risks attached, often in the form of misconfiguration errors.
5 Exciting players in the Breach and Attack Simulation (BAS) Cyber Security Category
Breach and Attack Simulation is a new concept that helps organizations evaluate their security posture in a continuous, automated, and repeatable way. This approach…
Researchers Find New Approach in Attacking Cloud Infrastructure
Cloud API’s accessibility over the internet opens a new window for adversaries to gain highly privileged access to cloud assets.
XM Cyber HaXM 1.0
Vendor: XM CyberPrice: Yearly license based on net- work size. Contact: xmcyber-staging.com What it does: Leverages simulations with Purple Team functionality to continuously expose all attack vectors and…
Volkswagen : ŠKODA AUTO DigiLab Israel Ltd commenced operation at the beginning of 2018 and has since made excellent connections in Tel Aviv’s local start-up and tech scene.
ŠKODA AUTO DigiLab Israel Ltd showcases new services and collaborates with more start-ups ŠKODA CEO Bernhard Maier was the main speaker at Israel’s most…
Supporting Breach and Attack Simulation
Read XM Cyber’s interview to TAG Cyber’s 2020 Security Annual on why BAS is one of the most important new controls in cybersecurity.
Cyber-risk management is about to get easier
New continuous automated penetration and attack testing (CAPAT) tools will help CISOs better see where they are vulnerable and prioritize remediation actions.
The 20 Worst Metrics in Cybersecurity
Security leaders are increasingly making their case through metrics, as well they should – as long as they’re not one of these.
Swiss Accelerator Kickstart Selects Three Cybersecurity Israeli Startups for Fourth Cohort
As part of the accelerator, the selected startups will be flown to Switzerland to receive mentorship and training by companies including Coca Cola, Credit…
Review: XM Cyber HaXM makes automated penetration testing more accessible, reliable
HaXM is the next logical evolution of automated pentesting programs. Not only does it offer continuous scanning that is easy to configure, it also…
Insights from the exhibition floor at Infosec 2019
We gather the thoughts, opinions and trends from the InfoSecurity 2019 event, held in London, England. One of the most significant events in the cybersecurity industry…
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.