Top White Papers and Webcasts

  • Breach and attack simulation (BAS) helps businesses automate and scale how they test their cybersecurity defenses. Unlike traditional penetration testing, which offers a point-in-time view of defenses, BAS can assess risk in real time, even as IT environments and networks change and increase in complexity.   Join technology journalist Sean Michael Kerner and Gus Evangelakos of XM Cyber, as they discuss how businesses can use breach and attack simulation to improve security, help meet compliance …

  • Disruptions to healthcare data, operations, productivity, and efficiency can result in severe, life-threatening consequences. Yet cybercriminals show no signs of remorse. In fact, global data collected shows attackers are only ramping up efforts. This report focuses on the top threat categories and families that plagued the medical industry over the last year, as well as the most common attack methods used by cybercriminals to penetrate healthcare defenses. In addition, it highlights the security challenges …