Blog

XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment

We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability…
Blog

One Year Later: The Tangible ROI of Exposure Management After Year One

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen…
Blog

Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack

Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being…
Blog

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex…
Blog

Unifying Cybersecurity Posture: Why A Digital Twin Approach Outperforms Traditional Data Aggregation

Securing an increasingly complex threat landscape is really hard and today, organizations face a major challenge: turning this ever-growing flood…
Blog

How Attackers Really Move – And 5 Steps to Make Their Job Much Harder

When non-cyber people imagine a cyberattack, they often picture a dramatic breach through a flashy zero-day exploit or high-profile vulnerability.…
Blog

Beyond the Checklist: Why Attackers Love Your Misconfigurations- And How to Stop Them

Some of the worst breaches in recent years didn’t come from sophisticated malware or cutting-edge exploits. They came from something…
Blog

Exposure Management in Retail: The Security Approach That Never Goes Out of Style

Retail changes fast – perhaps faster than any other customer-facing vertical. Online stores, mobile apps, and cloud-based operations are constantly…
Blog

Bridging Theory and Practice: How Continuous Security Controls Optimization Complements Proactive Defense and Posture Management

A report was recently published by Gartner®: Reduce Threat Exposures with Security Controls Optimization. This new report discusses how, in…
Blog

Forrester’s Unified Vulnerability Management (UVM) – What it Means and Why it Matters

Forrester recently published their new market guide for Unified Vulnerability Management (UVM), and we are excited that XM Cyber has…
Blog

From Blocker to Enabler: Translating Cyber Risk into Business Value

When it comes to justifying security investments to the CFO, technical arguments aren’t enough. Any CFO worth their paycheck will…
Blog

Ten Things You Need to Do Yesterday to Stay Compliant with NIS2

When it comes to the EU’s NIS2 Directive, meeting the basic requirements (according to the legislation in your company’s location)…
Blog
1 2 3 4 5 30

Request a demo

See what attackers see, so you can stop them from doing what attackers do.