Please turn on your JavaScript for this page to function normally.
Infosec products of the month
Infosec products of the month: October 2024

Here’s a look at the most interesting products from the past month, featuring releases from: Action1, Balbix, BreachLock, Commvault, Dashlane, Data Theorem, Edgio, ExtraHop, …

HNS
XM Cyber Vulnerability Risk Management boosts prioritization with actual impact analysis

XM Cyber launched its innovative Vulnerability Risk Management (VRM) solution, extending its Continuous Exposure Management Platform. This new approach to vulnerability …

Video: Cybertech Europe 2023
Cybertech Europe 2023 video walkthrough

In this Help Net Security video, we take you inside Cybertech Europe 2023 at La Nuvola Convention Center in Rome. The video features the following vendors: Accenture, Armis, …

Cybertech Europe 2023
Photos: Cybertech Europe 2023

The Cybertech Europe conference and exhibition takes place at La Nuvola Convention Center in Rome, and features the latest innovative solutions from dozens of companies and …

Black Hat
Photos: Black Hat USA 2023

Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas and Help Net Security was on-site. The conference featured over 100 selected Briefings, …

Cybertech Tel Aviv 2023
Video walkthrough: Cybertech Tel Aviv 2023

Help Net Security is in Israel this week for Cybertech Tel Aviv 2023, talking to the key players from the cybersecurity industry and businesses from a wide range of sectors, …

Cybertech Tel Aviv 2023
Photos: Cybertech Tel Aviv 2023

Cybertech Tel Aviv 2023 is under way at the Tel Aviv Expo. The conference and exhibition gathers cybersecurity experts, businesses and startups from around the world, and Help …

Acquisitions
XM Cyber acquires Cyber Observer to help organizations improve their security posture

XM Cyber announced the acquisition of Cyber Observer, an innovator in Continuous Controls Monitoring (CCM) and Cloud Security Posture Management (CSPM). This marks the latest …

security platform
XM Cyber announces new capability to detect exposures in Microsoft Active Directory

XM Cyber announced a new security capability for Microsoft’s Active Directory (AD). With this new capability, enterprises gain end-to-end attack path visualization for easy …

cloud
Top attack techniques for breaching enterprise and cloud environments

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors to compromise critical assets in …

94% of critical assets can be compromised within four steps of the initial breach point

An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and cloud environments, demonstrating the importance of risk …

IoT
How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid …

Don't miss

Cybersecurity news