Blog

A Comprehensive Guide to Getting and Calculating Cybersecurity CPE Credits

“Keeping up with my CPE credits is my favorite part of my job.” Said no one. Ever.  Continuing Professional Education…
Blog

The GenAI Train has Left the Station: It’s Time to Secure the Tracks

The adoption of generative AI in business introduces significant security and privacy risks. The ability to create convincing fake content…
Blog

The Anatomy of a Healthcare Cyberattack: Two True Stories

It’s no secret that the healthcare industry is a prime target for attackers. According to research from Check Point, healthcare…
Blog

The Cloud is Just Half the Problem

With many organizations making their shift to the cloud, a clear “cloud first” mentality has become prevalent among security professionals.…
Blog

Why Focusing on Choke Points Can Help Solve Your Resource Constraints

Managing and remediating cyber exposures is no simple task.  Trying to keep up with myriad vulnerabilities and exposures is difficult…
Blog

Identity-based Exposures – 4 Ways to Prevent Them

Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today,…
Blog

Continuous Compliance:

Where Security’s Rubber Meets Compliance’s Road

How compliance can strengthen security and security can strengthen compliance Compliance and security, though not at all the same, are…
Blog

How Financial Services Institutions Are Tackling Continuous Exposure Management

Leading Financial Services institutions are proactively identifying their most high-risk exposures with an Exposure Management platform. This post recounts 4…
Blog

From Our Experts: 14 Tips to Reduce Your Exposure to Ransomware

At XM Cyber, we’re all about reducing your cyber exposures to protect your attack surface. There are quite obviously loads…
Blog

Attack Surface Reduction: 7 Expert Tips to Defend Your Organization

Back in the day, networks used to be likened to castles – with strong, impenetrable walls and entrance strictly limited…
Blog

Extracting Encrypted Credentials from Common Tools

Overview During our day to day research, we face the question of what can be extracted from a  compromised machine…
Blog

2023: Time to Secure Active Directory and Azure AD

Four key action items to harden AD and Azure AD in 2023 First introduced in 1999 as Microsoft Active Directory…
Blog
1 9 10 11 12 13 30

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.