From Reactive to Proactive: Building a Continuous Exposure Management Plan
Most security leaders I’ve worked with completely get the theory of exposure management. The challenge lies in turning that theory into practice. Many EM…
From Alerts to Action: Streamlining Remediation Operations with Continuous Exposure Management
Security teams face an unprecedented challenge; Attackers are moving faster than ever before, and the proliferation of openly-available AI-powered attack tools have democratized advanced…
Flipping the Script on Exposure Management: Seeing Risk the Way Attackers Do
As someone coming from an application security background, stepping into the world of Exposure Management has been both exciting and a bit overwhelming. Since…
Windows Server Update Service (WSUS) Critical Vulnerability: CVE-2025-59287 Under Active Exploitation
Overview Microsoft has disclosed a critical remote code execution (RCE) vulnerability in Windows Server Update Service (WSUS), tracked as CVE-2025-59287. Initial warnings indicated a…
Cracking the Boardroom Code: A New Path for CISOs
CISOs dedicate entire careers to mastering security. With a skill set expertly tuned to spotting threats, building defenses, and maintaining compliance, the goal is…
CRITICAL ALERT: Oracle E-Business Suite Zero-Day Vulnerability, CVE-2025-61882, Under Active Exploitation!
Overview Oracle has just disclosed that a critical zero-day vulnerability, tracked as CVE-2025-61882, has been identified in Oracle E-Business Suite (EBS) and is currently…
Can CTEM Address the Hidden Gaps in Your PAM Program?
Traditional Privileged Access Management (PAM) solutions have long played a critical role in identity security. They are the cornerstone of a zero-trust model, designed…
Your Supply Chain Is an Attack Surface – Here’s How to Secure It
Supply chains are a favorite target for attackers. Every vendor, partner, and service provider adds new ways into your sensitive systems – many of…
Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity
Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own tools to the workplace,…
XM Cyber and Google SecOps: Turning Context into Action
Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert demands attention, yet it’s…
XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment
We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment. This isn’t something…
One Year Later: The Tangible ROI of Exposure Management After Year One
In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen focus, accelerate response times,…
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.