Blog

Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity
Zur Ulianitzky & Peled Eldan | August 20, 2025

Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own tools to the workplace,…

XM Cyber and Google SecOps: Turning Context into Action
August 18, 2025

Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert demands attention, yet it’s…

XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment
Batya Steinherz | August 07, 2025

We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment. This isn’t something…

One Year Later: The Tangible ROI of Exposure Management After Year One
Jason Fruge & Caleb Jones | July 27, 2025

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen focus, accelerate response times,…

Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack
Batya Steinherz | July 21, 2025

Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being actively exploited in the…

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions
Matthew Quinn | July 07, 2025

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex and years in the…

Unifying Cybersecurity Posture: Why A Digital Twin Approach Outperforms Traditional Data Aggregation
Alex Welin | June 30, 2025

Securing an increasingly complex threat landscape is really hard and today, organizations face a major challenge: turning this ever-growing flood of data into actionable…

How Attackers Really Move – And 5 Steps to Make Their Job Much Harder
Gali Rahamim | June 18, 2025

When non-cyber people imagine a cyberattack, they often picture a dramatic breach through a flashy zero-day exploit or high-profile vulnerability. The truth is, as…

Beyond the Checklist: Why Attackers Love Your Misconfigurations- And How to Stop Them
Batya Steinherz | May 29, 2025

Some of the worst breaches in recent years didn’t come from sophisticated malware or cutting-edge exploits. They came from something much simpler – somebody,…

Exposure Management in Retail: The Security Approach That Never Goes Out of Style
Daniel Hoffman | May 22, 2025

Retail changes fast – perhaps faster than any other customer-facing vertical. Online stores, mobile apps, and cloud-based operations are constantly evolving and improving. But…

Bridging Theory and Practice: How Continuous Security Controls Optimization Complements Proactive Defense and Posture Management
Dale Fairbrother | May 15, 2025

A report was recently published by Gartner®: Reduce Threat Exposures with Security Controls Optimization. This new report discusses how, in their viewpoint, the growing…

Forrester’s Unified Vulnerability Management (UVM) – What it Means and Why it Matters
Dale Fairbrother | May 05, 2025

Forrester recently published their new market guide for Unified Vulnerability Management (UVM), and we are excited that XM Cyber has been recognized in this…

1 2 3 4 29

See what attackers see, so you can stop them from doing what attackers do.