Newsroom

Topics

Report Reveals Alarming Cloud Misconfiguration and Exposed Assets

In a bid to shed light on the risks and best practices associated with cloud computing, Qualys has unveiled the…
News

XM Cyber Announces a distribution partnership with MEA Tec

Tel-Aviv, 27.8.23, MEA Tec. Distribution, a leading distributor of cybersecurity solutions in the Middle East, today announced a distribution partnership…
Press Releases

Diagnostic fatigue is causing havoc on cyber efficiency

We can all agree that the effective detection and diagnosis of security threats is a fundamental component of cyber resilience.…
News
20 Hottest New Cybersecurity Tools At Black Hat 2023

20 Hottest New Cybersecurity Tools At Black Hat 2023

At Black Hat 2023 this week, vendors are showcasing new products in segments including XDR, application security, vulnerability management and…
News

XM Cyber Extends Continuous Exposure Management Capabilities

Company bolsters signature platform that eases the scoping, prioritization, validation and remediation of security exposures, by continuously evaluating threats from…
Press Releases

Understanding Active Directory Attack Paths to Improve Security

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning…
News

Unveiling the Hacker’s Mind: Insights into the Future of Cybersecurity

The landscape of cybersecurity is constantly evolving, with emerging technologies reshaping the way we protect our digital infrastructure. One such…
News

Companies of the Schwarz Group Partner Up with FC Bayern Munich

PreZero helps save resources by promoting circular economy at club venues Lidl’s own brand Saskia mineral water for players, hospitality…
Press Releases

What is cloud security? Fundamental guide

Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual…
News

Focus Security Efforts on Choke Points, Not Visibility

By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
News

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP,…
News

How ‘quick wins’ can boost cyber agility and resilience 

Cybersecurity has reached a major crossroads – and the paradigm for success has shifted. For years, the lack of control…
News
1 4 5 6 7 8 30

Request a demo

See what attackers see, so you can stop them from doing what attackers do.