Cyber resilience

Disintegrating security beliefs

IDM and a false sense of security – case study by our CTO

I recount a case from one of my previous CISO positions, at a bank network with 1000+ employees. A serious exploit was experienced in the branch network, affecting certain accounts’ balance data. During the tedious and complex investigation, my team and I discovered that a member of our workforce was able to carry out the …

IDM and a false sense of security – case study by our CTO Read More »

data flow

Data breach prediction 2.0 – Welcome to your more secure future!

Every piece of information has value for somebody. Credit card data, personal data, business information, legal documents…   Cybercriminals still compose complicated attacks today but there is one thing in common in all of them: they all do intelligence gathering which includes not only the technological circumstances but the organization too. To succeed they have …

Data breach prediction 2.0 – Welcome to your more secure future! Read More »

Cyber resilience

Cyber resilience: Secure the future of your business

As Salesforce’s Chief Trust Officer, Jim Alkove put it in the World Economic Forum:  “Cyber resilience starts with nailing the cyber security basics. At Salesforce, we call it ´doing the common uncommonly well.´… Business resources are often still allocated to defensive cyber security, which is focused on protecting the confidentiality and integrity of data. But …

Cyber resilience: Secure the future of your business Read More »

Cyber security threats for SMBs: get back in control

Cyber security threats are often overlooked by SMBs, thinking “they’re not big enough” to be an actual target. This attitude leaves open doors for attackers, because not all cyber criminals go after the big fish, there are other levels on the food chain and attackers are ready to devour your company data or even more …

Cyber security threats for SMBs: get back in control Read More »

Phishing attack

Phishing attack prevention and self-defense for SMBs: minimize access risk!

Phishing attacks are the most common cause for data theft, so the goal of this article is to teach you some self-defense strategies. Just like in martial arts, the key to self-defense relies on two factors:  know the enemy: raise cyber security awareness in your company know yourself: identify access risk in your company and …

Phishing attack prevention and self-defense for SMBs: minimize access risk! Read More »

ECSO CYBERSECURITY MARKET RADAR

We are proud to announce that XS MATRIX is listed in the latest 2020 release of ECSO CYBERSECURITY MARKET RADAR which collects significant vendors on the European cybersecurity market and deployment-ready cybersecurity solutions. With more than 100 European cybersecurity companies the 3rd ECSO Cybersecurity Market Radar release presents rich European cybersecurity industry landscape.  Our solutions …

ECSO CYBERSECURITY MARKET RADAR Read More »

The most feared topic an auditor can ask! 3/10

Continuous growth of unnecessary access rights, called ‘privilege creep’, have both technical and human causes. The technical reason is that in different software products, entitlements can usually be set very finely and in many ways, but in order to manage them easily and efficiently, they aggregate them into different groups. This means that the access objects, belonged to some software functions and …

The most feared topic an auditor can ask! 3/10 Read More »

The most feared topic an auditor can ask! 1/10

I’m starting a series of articles that will cover a significant topic: The Principle Of Least Privilege (PoLP). This extremely important topic is rarely mentioned in IT sphere. In my experience, the industry neglects the problem. The failure to comply with this challenging issue multiplies problems in many areas of IT security. My primary goal is to …

The most feared topic an auditor can ask! 1/10 Read More »

Scroll to Top