Exposures, Exposed! Weekly Round-up August 27-31
XM Cyber Research | August 31, 2023

Welcome to XM Cyber’s new weekly news round-up, Exposures, Exposed! This column takes a look at all the events regarding cyber exposures that caught…

Using GenAI to Improve Cybersecurity, with Privacy at the Forefront
Shahar Fermon | August 24, 2023

In this digital age, cybersecurity has become essential to every organization’s operations and an integral part of our consciousness as individuals. With an ever-rising…

Keep Your Eye on the Ball: Leveraging Attack Paths to Achieve CTEM Goals
Mark Jaffe | August 18, 2023

It’s summer and I’m a baseball fan, so please excuse the extended metaphor. Let’s start with some chilling stats: some 70% of companies suffered…

In-House Expert Roundup: Top 18 Cyber Upskilling Resources
Batya Steinherz | August 13, 2023

In today’s dynamic cyber landscape, the importance of continuing cyber education – “upskilling” in tech lingo – cannot be overstated. Cyber upskilling empowers professionals…

Want to Fix Exposure Management? Stop Wasting Time on the Wrong Things
Michael Greenberg | August 03, 2023

There’s a lot of talk about how to make the most of what you’ve got, especially in light of the less-than-amazing economic situation at…

10 Tips to Get Buy-in From Your CFO for Security Projects
Gali Rahamim | July 27, 2023

  Everyone agrees that cybersecurity is important – but it’s always been and remains a tough budgetary sell. Even today, with cybersecurity firmly on…

10 Tips to Get Security and Non-Security Teams on the Same Page
Batya Steinherz | July 25, 2023

  Some rivalries are well-known to be irreconcilable – like The Montagues and the Capulets, or  The Sharks and The Jets. Here’s another well…

Economy’s Crummy? Here’s How to Leverage it for Better Security Posture 
Uri Levy | July 20, 2023

  Companies are like governments – and people, for that matter: when times are good, they tend to expand. When there are extra tax…

CVE-2023-36884 – Nation-State RCE Targets Government Agencies with Malicious Microsoft Office Documents
David Azria & Batya Steinherz | July 13, 2023

Updated on 27/07/2023 On July 11th, Microsoft announced they had uncovered a zero-day bug found in numerous Windows and Office products with a criticality…

Must-Have Expert Tips & Tricks to Implement Your CTEM Program
Michael Greenberg | July 13, 2023

Happy birthday to CTEM!  It’s been a year since Gartner first mentioned Continuous Threat Exposure Management (CTEM) in their foundational report Implement a Continuous…

10 Hot Cybersecurity Tips to Keep Your Employees Stay Safe This Summer
Batya Steinherz | July 05, 2023

Summer’s here – true, not everywhere, but if you live in the upper half of the world map, it’s probably pretty sunny and hot…

Almost Two Decades Later: Why is the Cloud Still the Wild West?
Dan Anconina | July 02, 2023

As a movie genre, Westerns tend to be long…very long, often. But there’s one Wild West show that’s been going on for nearly two…

1 2 3 4 5 24

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.