Newsroom

Topics

Opinion: Making Cybersecurity Collaboration Work on a Global Scale

Following the French President’s call for a binding international agreement on cybersecurity and cyber warefare, we asked cyber experts for their opinion on the…

RSA Security Conference 2019 Highlights

Trends in 2019 for cybersecurity according to the show floor at the RSA Security Conference

XM Cyber Takes Home Three Cyber Defense Magazine InfoSec Awards 2019

Recognized as a Hot Breach and Attack Simulation Company, NextGen Infosec Startup of the Year, and Publisher’s Choice for Security Software SAN FRANCISCO, USA, March…

XM Cyber Expands HaXM Automated Purple Team Platform With New Capabilities and Certifications

Enhanced Platform to be Showcased at RSA Conference 2019 HERZLIYA, Israel, Feb. 20, 2019 /PRNewswire/ — XM Cyber, the multi-award-winning breach and attack simulation (BAS) leader, today unveiled…

XM Cyber Expands HaXM Automated Purple Team Platform With New Capabilities and Certifications

Enhanced Platform to be Showcased at RSA Conference 2019 HERZLIYA, Israel, Feb. 20, 2019 /PRNewswire/ — XM Cyber, the multi-award-winning breach and attack simulation (BAS)…

German Army Seeks to Partner With Israeli Cyber and AI Startups

The German army plans to start working with Israeli companies and expand cooperation with Israeli startups, Marcel ‘Otto’ Yon, CEO of the Bundeswehr Cyber…

Leading BAS Vendors Providing High-end Security

The number of cyber crimes has been increasing day to day. As the possibility of being hacked is high, many B2B companies have focused on additional…

Israeli Tech Luminaries to Take the Stage at WeTechBerlin

Calcalist to lead a delegation of leading figures from Israel’s tech industry to Berlin in February. Following conferences in San Francisco, New York, London,…

Israel jumps to No. 5 on Bloomberg Innovation Index

“The Middle Eastern country surpassed Singapore, Sweden and Japan in the process,” said Bloomberg. The index was released as global elites gather at the…

Simulating Lateral Attacks Through Email

A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them.

Opinion How AI and automation will impact cybersecurity strategies

My real first experience with data security came in 2000 when my personal information was exposed on a website where a disgruntled employee was…

2018 Review: Big Investments, High Confidence in Local Solutions for Israel’s Cyber Innovators

The Israeli cyber scene is wrapping up a year of big investments, groundbreaking security solutions, cyberespionage allegations, and outgunning ransomware vendors.

1 19 20 21 22 23 27

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.