Glossary

What is the Vulnerability Management Lifecycle?
XM Cyber |

The Vulnerability Management Lifecycle is a step-by-step process that helps organizations identify and address weaknesses in their cybersecurity stack. The lifecycle consists of clear…

What is a Common Vulnerabilities and Exposure (CVE)?

A Common Vulnerability and Exposure (CVE) is a standardized identifier for publicly disclosed cybersecurity vulnerabilities. It’s like a unique serial number for software flaws…

Known Exploited Vulnerabilities

What are Known Exploited Vulnerabilities? Known Exploited Vulnerabilities (KEVs) are weaknesses in software, hardware, applications, or systems that are being actively exploited by attackers….

Ransomware Readiness Assessment

What is a Ransomware Readiness Assessment? Ransomware is a growing and potentially devastating threat to organizations. The consequences of ransomware attack range from inconvenience…

Digital Risk Protection

What is Digital Risk Protection? Digital Risk Protection (DRP) is how organizations protect their digital assets and brand from external threats. It’s a proactive…

What is Automated Security Validation?

What is Automated Security Validation? Automated Security Validation (ASV) is the process of automatically verifying the effectiveness of your security procedures and controls in…

What is Active Directory Security?

What Are Active Directory Security Best Practices? Since 1999, Active Directory has been the default identity and access management service in Windows networks. Active…

What is Cyber Risk Quantification?

Cyber Risk Quantification (CRQ) is a vital process in cybersecurity that calculates the potential impact of risk in terms that make sense for your…

What is Exposure Management?

Exposure management is a process by which organizations identify, evaluate and mitigate risks that dramatically impact operational resilience, financial stability and even business continuity….

What is Attack Path Analysis?

Attack path analysis is a cybersecurity technique that helps cyber defenders and security stakeholders identify and map potential routes that threat actors could take…

What is Risk Exposure?

Risk exposure is a quantification of the vulnerability of an individual, organization, or asset to adverse events or uncertainty. It can show how susceptible…

What is Continuous Threat Exposure Management (CTEM)

Continuous Threat Exposure Management (CTEM) is a proactive and continuous five-stage program or framework that helps organizations monitor, evaluate, and reduce their level of…

1 2 3

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.