CISOs advised to rethink vulnerability management as exploits sharply rise
Surge in vulnerabilities and exploits leaving overloaded security teams with little recourse but to embrace risk-based approaches to patching what they can. Enterprise attack…
How to Manage Shadow AI Risk Without Killing Innovation
Shadow AI isn’t a fringe behavior; it’s the norm. My team recently analyzed AI usage patterns across multiple industries and found signs of unapproved AI activity…
XM Cyber Delivers Innovative Security Solutions for Digital Resilience with Google Cloud
Tel Aviv, September 9th, 2025: XM Cyber is deepening its partnership with Google Cloud to offer enterprises more secure digital solutions. The collaboration brings…
Five exposure gaps that can get past PAMs
Traditional privileged access management (PAM) tools have long played a critical role in identity security. However, they often lack a threat-led approach that connects…
Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation
Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the…
Netpoleon Partners with XM Cyber to Continuously Reduce Risk
XM Cyber helps organisations move away from endless lists of vulnerabilities, and instead, operationalise CTEM initiatives and fix issues with the greatest impact. SYDNEY,…
Security Tools Alone Don’t Protect You — Control Effectiveness Does
61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an…
SB Technology Partners with XM Cyber to Bring Continuous Exposure Management to Leading Enterprises in Japan
SB Technology will partner with XM Cyber to help organizations adopt the Continuous Threat Exposure Management (CTEM) framework. TEL AVIV, Israel/TOKYO, Japan, May 7,…
Make the move to more meaningful metrics
Cybersecurity has become an increasingly strategic imperative, but the ways we quantify, qualify, and report on risk have been slow to evolve.
Trinity partners with XM Cyber to bring CTEM to leading enterprises in the UK
Trinity OT Security, specialising in cybersecurity solutions, system integration, and professional services dedicated to digital and Operational Technology (OT) environments, today announced its distribution…
AWS EKS Security Best Practices Security Theater: Vanity Metrics Keep You Busy – and Exposed
After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500 companies, I’ve learned that looking busy isn’t…
Outsmarting Cyber Threats with Attack Graphs
Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static…