Blog

The Five Steps of CTEM, Part 1: Scoping – Risk and Impact
Maya Malevich | January 18, 2024

Welcome to the first installment of our five-part journey through the stages of Continuous Threat Exposure Management (CTEM). In this series, I’ll take you…

New XM Cyber Survey: How Organizations Secure Their Digital Frontiers
Batya Steinherz | January 11, 2024

The digital world has become a battleground. In recent years, cyberattacks have continued to grow in frequency, scope, sophistication and impact. Despite monumental efforts…

In-house Expert Roundup: It’s Prediction Time – Watch for Subtle Shifts and Seismic Changes in 2024
Batya Steinherz | January 01, 2024

The end of the year has snuck up on us again. And as we do every year, we’ve turned to our in-house XM Cyber…

The Key to Building Cyber Resilience for MSSPs
Craig Boyle | December 17, 2023

Cybersecurity awareness is transforming every aspect of the organizational landscape. Cybersecurity is no longer relegated to security backrooms – it is front and center…

Using Kubernetes Raises Security Stakes: Three Attack Paths
Zur Ulianizky & Karin Feldman | December 07, 2023

There’s really no question when it comes to which container orchestration platform leads the market – yeah you guessed it, It’s Kubernetes. In recent…

Here is What We’re Thankful for This Thanksgiving
XM Cyber | November 23, 2023

Thanksgiving is the perfect opportunity to focus on, well, being thankful.  It’s a time to reflect on the bounty we experience each day, and…

One Top-Tier Automotive Giant, Two Dangerous Attack Paths
Felix Weber | November 16, 2023

It likely comes as no great surprise – cybersecurity is a paramount concern in the automotive industry.  For all of the same reasons it’s…

The TIBER-EU Framework: Here’s What You Need to Know
Batya Steinherz | November 09, 2023

Compliance frameworks aren’t always the most fascinating of topics, but they are always important topics. Today we’re looking at TIBER-EU (Threat Intelligence-Based Ethical Red…

Now That Cyber Awareness Month is Over, Don’t Forget These Tips and Best Practices
XM Cyber | November 02, 2023

When it comes to cyber awareness, a lot of professionals (you, perhaps?) may assume that being “in the know” means there’s nothing left to…

Gartner Trends: In 2024, CTEM is Top Priority for Enterprises
Batya Steinherz | October 31, 2023

Well, it’s almost the end of the year and you know what that means?  It’s time for all the predictions/wrap up/upcoming trends blogs and…

Four Real-Life Financial Service Attacks Paths
Ian Gallagher | October 19, 2023

Back in the wild west, there was this guy, Willie Sutton. Willie’s chosen profession wasn’t the town dentist-barber or saloon owner. Nope, he was…

New Name, Same Risks: Two Microsoft Entra ID Attack Paths
Zur Ulianitzky and Bill Ben Haim | October 04, 2023

For those not yet aware, Microsoft Entra ID is the new name for Azure AD, just announced this July. By way of brief history,…

1 2 3 4 5 6 26

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.