Blog

Cyber Insurance, Smarter
Caleb Jones | February 07, 2024

Integrating exposure management into cyber insurance policies can dramatically reduce risks for insurers and slash premiums for businesses – a true win-win Cyber insurance…

Mobilizing CTEM with XM Cyber and Jira Integration
Dale Fairbrother | January 31, 2024

One of the key stages to effectively implement a Continuous Threat Exposure Management (CTEM) Program is the Mobilization stage.  This last step along the…

The Value of Extending Your Team
Hezi Nagar | January 25, 2024

It’s a classic dilemma in any domain: how to accomplish more, without spending more. Addressing the ever-growing number of exposures that organizations have is…

The Five Steps of CTEM, Part 1: Scoping – Risk and Impact
Maya Malevich | January 18, 2024

Welcome to the first installment of our five-part journey through the stages of Continuous Threat Exposure Management (CTEM). In this series, I’ll take you…

New XM Cyber Survey: How Organizations Secure Their Digital Frontiers
Batya Steinherz | January 11, 2024

The digital world has become a battleground. In recent years, cyberattacks have continued to grow in frequency, scope, sophistication and impact. Despite monumental efforts…

In-house Expert Roundup: It’s Prediction Time – Watch for Subtle Shifts and Seismic Changes in 2024
Batya Steinherz | January 01, 2024

The end of the year has snuck up on us again. And as we do every year, we’ve turned to our in-house XM Cyber…

The Key to Building Cyber Resilience for MSSPs
Craig Boyle | December 17, 2023

Cybersecurity awareness is transforming every aspect of the organizational landscape. Cybersecurity is no longer relegated to security backrooms – it is front and center…

Using Kubernetes Raises Security Stakes: Three Attack Paths
Zur Ulianizky & Karin Feldman | December 07, 2023

There’s really no question when it comes to which container orchestration platform leads the market – yeah you guessed it, It’s Kubernetes. In recent…

Here is What We’re Thankful for This Thanksgiving
XM Cyber | November 23, 2023

Thanksgiving is the perfect opportunity to focus on, well, being thankful.  It’s a time to reflect on the bounty we experience each day, and…

One Top-Tier Automotive Giant, Two Dangerous Attack Paths
Felix Weber | November 16, 2023

It likely comes as no great surprise – cybersecurity is a paramount concern in the automotive industry.  For all of the same reasons it’s…

The TIBER-EU Framework: Here’s What You Need to Know
Batya Steinherz | November 09, 2023

Compliance frameworks aren’t always the most fascinating of topics, but they are always important topics. Today we’re looking at TIBER-EU (Threat Intelligence-Based Ethical Red…

Now That Cyber Awareness Month is Over, Don’t Forget These Tips and Best Practices
XM Cyber | November 02, 2023

When it comes to cyber awareness, a lot of professionals (you, perhaps?) may assume that being “in the know” means there’s nothing left to…

1 2 3 4 5 6 26

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.