Ressourcen
A CISO’s Guide to Reporting Cyber Risk to the Board
In the eBook you’ll learn the four key challenges CISOs face when reporting to the board:
eBooks & Whitepapers
Chaining together Active Directory attack techniques to give your organization the edge against attackers
Debuting at RSA 2022 we will show the industry how we can link the use of Active Directory (AD) into…
Blog
Prevent cyber attacks in Azure before they happen
Misconfigurations within Azure environments are more common than you think. It’s important to learn and understand how attackers can exploit…
Webinars
Attack Path vs Attack Vector: Important Differences You Need To Know
If you want to solve a problem, defining your terms is essential — and there are few more pressing problems…
Blog
2022 Attack Path Management Impact Report
The XM Cyber 2022 Attack Path Management Impact Report is the industry’s first annual report that reveals the likelihood and…
eBooks & Whitepapers