Demystifying MITRE’s ATT&CK to supercharge cyber defenses - Part I

Ransomware is on the rise, massive data breaches are announced with scary regularity, and APTs continue to nestle themselves in networks going completely undetected for months and sometimes even years.  Although organizations across all industries keep on increasing their cybersecurity budgets and[...]

Unpatched vulnerabilities provide an open door for Cybercrooks

Knock knock, whose there? A Cybercrook is exploiting known vulnerabilities to penetrate the organization for an easy picking.

Cymulate Named 2018 Gartner Cool Vendor

If you have been following our blog, you know that we normally cover the latest trends in cybersecurity, discuss data breaches, and explain about compliance issues. This time, I wrote a blog post that is different from my usual ones.

Privacy Anyone?

GDPR is here! Are you ready? Cymulate is here to help. As you know, on May 25, 2018 the General Data Protection Regulation (GDPR) came into force, impacting organizations around the globe. As with any new regulation, not all organizations comply (yet). In case of GDPR, this should not be[...]

Leveraging Cyber Simulation for M&A

Why Cybersecurity Is Critical for a Successful M&A In its “Cybersecurity Is Critical to the M&A Due Diligence Process” research note, Gartner points out that the M&A process is complicated by the inability to integrate and manage the cybersecurity practices of both companies. As part of the due[...]

Dark Web Shopping Center

Black Mirror – Looking at the dark web marketplace for cybercrime We all know about cybercriminals, but do we also understand where they get their tools of the trade? Let’s go the dark side and have look at the black mirror reality of the cybercrime marketplace.

SMBs - The Cybercrook’s Favorite Snack

Cybercrooks just love going after small and medium-sized businesses since they are more vulnerable to cyberattacks than large organizations that have cybersecurity teams and top-notch security solutions in place. This makes those smaller organizations not only more vulnerable, but attacking them[...]

Still Phishing in Troubled Waters

You might think that we have become good at identifying phishing attacks today, but that’s a dangerous assumption. The frightening truth is, that around 90% of all cyberattacks start with a phishing or spear phishing email.

The US is Fighting in the Cyber Trenches

Yes, the US is under cyberattacks - constantly Being a rich superpower comes with a price, as the US found out the hard  way. Especially American healthcare and financial organizations remain popular targets, since they are rich pickings for cybercrooks. Infrastructure is another favorite, as are[...]

SOC Enhancement With Cymulate KPI

Risk Score KPI Lets Your SOC Rock Your Cybersecurity In the good old days, a security operations center (SOC) was basically a room full of live camera feeds to let the organization see what’s going and to take action if necessary. It started with government agencies, defense departments, followed[...]