Comprehensive Threat-Driven Security Operations Require Unification of Threat Intelligence, … [Read more...]
Breach Attack Simulation
The Breach & Attack Simulation (BAS) technology Revolution Breach & Attack Simulation - … [Read more...]
Automating the purple team in the face of APTs
Automating the purple team in the face of APTs What is a purple team in cybersecurity? The … [Read more...]
Can We Automate Security Testing?
Can We Automate Security Testing? Author: Jeff Anderson, VP Marketing, XM Cyber Can We Automate … [Read more...]
The Imperative to Detect Lateral Movement
The Imperative to Detect Lateral Movement The Imperative to Detect Lateral Movement - The last … [Read more...]
























