blog_hero_02

Blog

Mor Ahuvia

Cymulate blog articles by Mor Ahuvia.

Recent Posts

What is Continuous Security Testing? Here are the Basics.
Mor Ahuvia, September 23, 2019
Read More >
Continuous security testing is the practice of challenging, measuring and optimizing the effectiveness of security controls on an ongoing basis, using automated testing tools, in order to continually identify new security gaps as they emerge, so they can quickly be fixed. Also called “security effectiveness testing,” the objective of continuous security testing is to find out how effective an organization’s current security controls are, uncover new security gaps as soon as they arise, and.
Read More >
Cymulate Launches *BAS for SMBs* to Increase Small Business Cyber Security
Mor Ahuvia, September 16, 2019
Read More >
Cymulate is proud to usher in a new age in the cyber security of small and midsized business (SMBs). With the launch of our new BAS for SMB bundles, it has never been simpler and more affordable to get your security posture up to par with the most security-mature enterprises. When it comes to cyber security, small and medium sized enterprises (SMEs) have it hard. Aware of their limited cyber security resources, threat actors specifically target them for their commercial accounts. According to.
Read More >
Red Teaming on Steroids - How to Optimize Security Controls Faster
Mor Ahuvia, July 19, 2019
Read More >
In the beginning there was pen testing. Then, developers accelerated pen testing with automated pentesting tools. Next, came the realization that instead of just one pen tester, a full team of pen testers could be deployed. Instead of seeking and exploiting security gaps opportunistically, they would perform reconnaissance work ahead of time, then plan and carry out a multi-step, multi-vector attack across the cyber kill chain, mimicking today’s sophisticated cyber heists and advanced.
Read More >
Three Things to Consider in a Breach and Attack Simulation Solution
Mor Ahuvia, May 21, 2019
Read More >
You’ve come to the conclusion that quarterly pen tests, monthly vuln scans and annual red teaming are great, but there still not enough. You need to know if you’re truly secure, and you need to know it right now. You’ve recently heard about breach and attack simulation (BAS) and how it can help. So what should you look for when evaluating BAS solutions? Here’s our $0.02.   Validation of both Internal and External Controls Many BAS solutions focus solely on challenging your internal network.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag