Cymulate
How do I select an automated red teaming solution for my business?
Red teaming is an essential part of an organization’s security assessment process. It is generally done manually to uncover possibile vulnerabilities and security gaps, …
Digital dependence and innovation: Two critical trends in cyber espionage and crime
Being a veteran cybersecurity incident responder with over 21 years of field experience I know I will always have a job and it will always be interesting. In the evolution of …
Cybercriminals innovate to find vulnerabilities that can be monetized
The global pandemic had a dramatic influence on the cybersecurity landscape in 2020. Cymulate, released its report on the 2020 security landscape and its impact on security …
Cymulate and Microsoft deliver security validation and operational efficiencies to customers
Cymulate announced that it has joined the Microsoft Intelligent Security Association and has integrated Cymulate with Microsoft Defender for Endpoint. These integrations …
Take your SOC to the next level of effectiveness
Enterprise security infrastructures average 80 security products, creating security sprawl and a big management challenge for SOC teams. With high volumes of data generated …
Cymulate and Symantec announce shared research of email-based attacks
Cymulate partnered with Symantec to provide an Attacker-Defender collaboration to share the research into the latest email-based threats. Cymulate’s Breach & Attack …
Featured news
Resources
Don't miss
- Creative cybersecurity strategies for resource-constrained institutions
- Product showcase: UserLock IAM for Active Directory
- Cryptomixer crypto laundering service taken down by law enforcement
- Treating MCP like an API creates security blind spots
- Offensive cyber power is spreading fast and changing global security