Blog

Can CTEM Address the Hidden Gaps in Your PAM Program?

Traditional Privileged Access Management (PAM) solutions have long played a critical role in identity security. They are the cornerstone of…
Blog

Your Supply Chain Is an Attack Surface – Here’s How to Secure It

Supply chains are a favorite target for attackers. Every vendor, partner, and service provider adds new ways into your sensitive…
Blog

Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity

Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own…
Blog

XM Cyber and Google SecOps: Turning Context into Action

Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert…
Blog

XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment

We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability…
Blog

One Year Later: The Tangible ROI of Exposure Management After Year One

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen…
Blog

Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack

Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being…
Blog

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex…
Blog

Unifying Cybersecurity Posture: Why A Digital Twin Approach Outperforms Traditional Data Aggregation

Securing an increasingly complex threat landscape is really hard and today, organizations face a major challenge: turning this ever-growing flood…
Blog

How Attackers Really Move – And 5 Steps to Make Their Job Much Harder

When non-cyber people imagine a cyberattack, they often picture a dramatic breach through a flashy zero-day exploit or high-profile vulnerability.…
Blog

Beyond the Checklist: Why Attackers Love Your Misconfigurations- And How to Stop Them

Some of the worst breaches in recent years didn’t come from sophisticated malware or cutting-edge exploits. They came from something…
Blog

Exposure Management in Retail: The Security Approach That Never Goes Out of Style

Retail changes fast – perhaps faster than any other customer-facing vertical. Online stores, mobile apps, and cloud-based operations are constantly…
Blog
1 2 3 4 5 30

Request a demo

See what attackers see, so you can stop them from doing what attackers do.