Avigayil Stein, August 4th , 2022
4 Ways to Save Your SOC Analyst from Burn Out
Eyal Aharoni, August 1st , 2022
Cymulate’s July 2022 Cyberattacks Wrap-up
Ben Zilberman, July 27th , 2022
What is “Continuous Threat Exposure Management” in Gartner’s 2022 Hype Cycle
Mike Talon, July 21st , 2022
Cybersecurity 101: Anti-malware, EDR, MDR, Oh My!
Ben Zilberman, July 20th , 2022
Five Biggest Takeaways from Gartner Hype Cycle™️ for Security Operations 2022
Ruben Jami, July 14th , 2022
Cymulate’s Off-the-Shelf Sigma Rules to Lighten SOC Engineers’ Workload
Avigayil Stein, July 7th , 2022
How MSSPs Can Provide Better Value with Continuous Security Validation
Eyal Aharoni, July 4th , 2022
Cymulate’s June 2022 Cyberattacks Wrap-up
Eyal Aharoni, June 27th , 2022
How Extended Security Posture Management Empowers Every Security Team
Arien Seghetti, June 23rd , 2022
How Deep Does the MITRE Supply Chain Security System of Trust Framework Go?
Dan Lisichkin, June 22nd , 2022
Understanding the Compound File Binary Format and OLE Structures to Mess with CVE-2022-30190
Dave Klein, June 16th , 2022
2022 Cymulate Breaches Survey – Five Key Takeaways
Mike Talon, June 14th , 2022
Cybersecurity Scoring in Plain English: On a Scale From One to Ten
Eyal Wachsman, June 10th , 2022
How to Harden Security Posture With Shrinking Security Budgets
Yoni Leitersdorf, June 9th , 2022
What Verizon’s DBIR Tells us About Unauthorized Intrusion Readiness
Cymulate Research Lab, June 2nd , 2022
CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files
Eyal Aharoni, June 2nd , 2022
Cymulate’s May 2022 Cyberattacks Wrap-up
Patricia de Hemricourt, May 26th , 2022
From Automated Penetration Testing to Continuous Security Validation
Avigayil Stein, May 19th , 2022
3 Reasons Manufacturers Are a Prime Target for Cyberattacks
Ben Zilberman, May 12th , 2022