XM Cyber Delivers Threat Exposure Insights and Context with Google Cloud
Tel Aviv, August 5th: XM Cyber is excited to announce a collaboration dedicated to pairing XM Cyber’s expertise in continuous exposure management and Google…
Five exposure gaps that can get past PAMs
Traditional privileged access management (PAM) tools have long played a critical role in identity security. However, they often lack a threat-led approach that connects…
Redefining Cyber Value: Why Business Impact Should Lead the Security Conversation
Security teams face growing demands with more tools, more data, and higher expectations than ever. Boards approve large security budgets, yet still ask the…
Netpoleon Partners with XM Cyber to Continuously Reduce Risk
XM Cyber helps organisations move away from endless lists of vulnerabilities, and instead, operationalise CTEM initiatives and fix issues with the greatest impact. SYDNEY,…
Security Tools Alone Don’t Protect You — Control Effectiveness Does
61% of security leaders reported suffering a breach due to failed or misconfigured controls over the past 12 months. This is despite having an…
SB Technology Partners with XM Cyber to Bring Continuous Exposure Management to Leading Enterprises in Japan
SB Technology will partner with XM Cyber to help organizations adopt the Continuous Threat Exposure Management (CTEM) framework. TEL AVIV, Israel/TOKYO, Japan, May 7,…
Make the move to more meaningful metrics
Cybersecurity has become an increasingly strategic imperative, but the ways we quantify, qualify, and report on risk have been slow to evolve.
Trinity partners with XM Cyber to bring CTEM to leading enterprises in the UK
Trinity OT Security, specialising in cybersecurity solutions, system integration, and professional services dedicated to digital and Operational Technology (OT) environments, today announced its distribution…
SiS Technologies Announces Strategic Distribution Agreement with XM Cyber to Enhance Cybersecurity Resilience in Asia
Singapore, 17th Feb 2025 – SiS Technologies, a leading IT distributor in the region, is pleased to announce its strategic distribution partnership with XM…
AWS EKS Security Best Practices Security Theater: Vanity Metrics Keep You Busy – and Exposed
After more than 25 years of mitigating risks, ensuring compliance, and building robust security programs for Fortune 500 companies, I’ve learned that looking busy isn’t…
Outsmarting Cyber Threats with Attack Graphs
Cyber threats are growing more sophisticated, and traditional security approaches struggle to keep up. Organizations can no longer rely on periodic assessments or static…
CTEM: How It’s Changing Cybersecurity and Tech Pros’ Jobs
Cybersecurity teams must defend an attack surface that continues to grow in scale and complexity. One 2022 study found that 67 percent of organizations reported…