blog_hero_02

Blog

Three Things to Consider in a Breach and Attack Simulation Solution
Mor Ahuvia, May 21, 2019
Read More >
You’ve come to the conclusion that quarterly pen tests, monthly vuln scans and annual red teaming are great, but there still not enough. You need to know if you’re truly secure, and you need to know it right now. You’ve recently heard about breach and attack simulation (BAS) and how it can help. So what should you look for when evaluating BAS solutions? Here’s our $0.02.   Validation of both Internal and External Controls Many BAS solutions focus solely on challenging your internal network.
Read More >
How BAS Optimizes Defense Against Supply Chain Attacks
Dor Sarig, May 6, 2019
Read More >
Supply chain cyberattacks are increasing as companies outsource a growing number of services. Today, your enterprise is more likely than ever to have third parties touching sensitive data[1]. Even when your security controls are robust, an attacker can breach a weaker network—like the network of one of your suppliers, service providers, or partners—and use it as an indirect route into your network[2]. In 2018, many highly publicized breaches were the result of supply-chain attacks: Atrium.
Read More >
How BAS Killed the Pen Test
Eyal Wachsman, April 23, 2019
Read More >
Cymulate’s Breach and Attack Simulation (BAS) as-a-Service has forever changed pen tests as we know them. From months to minutes, cloud-based BAS has revolutionized how fast organizations can get security assessment results, and how much they must pay to know how secure they are at any given point in time. Predicting the Present In February 2018, Mr. Augusto Barros, Research VP at Gartner, predicted that breach and attack simulation technology (BAS), combined with vulnerability assessments,.
Read More >
4 Steps for Getting a Handle on Your Organization's Security Posture as a New CISO
Dor Sarig, March 21, 2019
Read More >
You just signed on as CISO. Congratulations. Now you can expect to be deluged with security emergencies and unresolved issues from your predecessor while you're getting to know and building credibility with your team. Meanwhile, cyberattackers are still pounding at the door. All of these immediate pressures are important, but optimizing organization-wide security is why you were hired. Here are four steps that will help you identify security priorities and appropriate remediation steps, so you.
Read More >
How Will You Focus Your Security Spending in 2019?
Eyal Aharoni, November 20, 2018
Read More >
As the person in charge of your organization's security, you are having sleepless nights troubled by visions of becoming a victim of a destructive cyberattack or being trashed in the media after a breach. You worry about strengthening the security posture of your organization which requires implementing the right security solutions.  The solutions are your only offense to protect the organization’s valuable assets, and it all rests on your shoulders.The fact that you have to work with a.
Read More >
Why CIOs Embrace BAS Platforms For Investment Decisions?
Eyal Aharoni, July 12, 2018
Read More >
According to security and analytics experts, companies worldwide have spent a combined $114b on security products (both hardware and software) and services last year. This figure is expected to exceed $140b by 2021. In 2017, the average cost of one data breach for organizations was $3.62 million and 66% of respondents believe data breaches or cyber-security exploits will seriously diminish their organization’s shareholder value. Organizations are making protection of customer data and.
Read More >
Are You Ready for the Next Cyber-Attack?
Eyal Aharoni, July 9, 2018
Read More >
Cyber-crooks are masters of crime constantly developing, testing and fine-tuning their techniques to mine valuable and sensitive information for their own profit. As such, cyber-attacks come in a wide range of shapes and forms. To illustrate, cyber-criminals use: Advanced Persistent Threat attacks (or APT in short) waging ongoing sophisticated hacking attempts targeted a person, business, or country; phishing attacks (including spear phishing an whaling) to steal sensitive information; .
Read More >
Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part III
Eyal Aharoni, July 3, 2018
Read More >
In our first blogpost about MITRE’s ATT&CK™ framework, we explained what it exactly is and how it contributes to cybersecurity. In our second blogpost, we dove deeper into the various features. In this blogpost, the third and final one in this series, we will discuss the future of MITRE’s ATT&CK™ framework as we see it. To recap: ATT&CK™ is a MITRE-developed, globally-accessible knowledge base of cyberattack strategies and techniques that have been detected and reported. This knowledge base is.
Read More >
Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part I
Eyal Aharoni, June 21, 2018
Read More >
Ransomware is on the rise, massive data breaches are announced with scary regularity, and APTs continue to nestle themselves in networks going completely undetected for months and sometimes even years.  Although organizations across all industries keep on increasing their cybersecurity budgets and hiring more staff, these measures are still not sufficient and effective enough. Lately, there has been a lot of noise around ATT&CK™, the Adversarial Tactics, Techniques, and Common Knowledge base.
Read More >
Leveraging Cyber Simulation for M&A
Eyal Aharoni, May 21, 2018
Read More >
Why Cybersecurity Is Critical for a Successful M&A In its “Cybersecurity Is Critical to the M&A Due Diligence Process” research note, Gartner points out that the M&A process is complicated by the inability to integrate and manage the cybersecurity practices of both companies. As part of the due diligence process, the acquiring company needs to examine the cybersecurity history and policies of the organization that it wants to acquire very carefully, as illustrated by the takeover of Yahoo by.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag