Please turn on your JavaScript for this page to function normally.
Video: Cybertech Europe 2023
Cybertech Europe 2023 video walkthrough

In this Help Net Security video, we take you inside Cybertech Europe 2023 at La Nuvola Convention Center in Rome. The video features the following vendors: Accenture, Armis, …

Cybertech Europe 2023
Photos: Cybertech Europe 2023

The Cybertech Europe conference and exhibition takes place at La Nuvola Convention Center in Rome, and features the latest innovative solutions from dozens of companies and …

Black Hat
Photos: Black Hat USA 2023

Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas and Help Net Security was on-site. The conference featured over 100 selected Briefings, …

Cybertech Tel Aviv 2023
Video walkthrough: Cybertech Tel Aviv 2023

Help Net Security is in Israel this week for Cybertech Tel Aviv 2023, talking to the key players from the cybersecurity industry and businesses from a wide range of sectors, …

Cybertech Tel Aviv 2023
Photos: Cybertech Tel Aviv 2023

Cybertech Tel Aviv 2023 is under way at the Tel Aviv Expo. The conference and exhibition gathers cybersecurity experts, businesses and startups from around the world, and Help …

Acquisitions
XM Cyber acquires Cyber Observer to help organizations improve their security posture

XM Cyber announced the acquisition of Cyber Observer, an innovator in Continuous Controls Monitoring (CCM) and Cloud Security Posture Management (CSPM). This marks the latest …

security platform
XM Cyber announces new capability to detect exposures in Microsoft Active Directory

XM Cyber announced a new security capability for Microsoft’s Active Directory (AD). With this new capability, enterprises gain end-to-end attack path visualization for easy …

cloud
Top attack techniques for breaching enterprise and cloud environments

In this video for Help Net Security, Zur Ulianitzky, Head of Research at XM Cyber, talks about the top attack techniques used by threat actors to compromise critical assets in …

94% of critical assets can be compromised within four steps of the initial breach point

An XM Cyber report reveals the security gaps and hygiene issues that exist in multiple attack paths across on-prem and cloud environments, demonstrating the importance of risk …

IoT
How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid …

Zur Ulianitzky
New and less known cybersecurity risks you should be aware of

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM CYber, gives insights on new and less talked about cybersecurity risks organizations …

xmgoat
XMGoat: Open-source pentesting tool for Azure

XMGoat is an open-source tool that enables penetration testers, red teamers, security consultants, and cloud experts to learn how to abuse different misconfigurations within …

Don't miss

Cybersecurity news