Resources

XM Cyber & IQUW: Focusing Effort Where it Matters Most

As Group CISO of luxury re-insurer IQUW, industry veteran Stephen Owens knows it’s impossible to fix all issues that could put a business at…

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions
Matthew Quinn | July 07, 2025

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex and years in the…

How to Align Exposure Management with Your True Business Risk

Join XM Cyber Principal Customer Advisor, Yaron Mazor, for a fascinating and informative webinar on XM Cyber’s four-step journey to align Exposure Management with…

Unifying Cybersecurity Posture: Why A Digital Twin Approach Outperforms Traditional Data Aggregation
Alex Welin | June 30, 2025

Securing an increasingly complex threat landscape is really hard and today, organizations face a major challenge: turning this ever-growing flood of data into actionable…

How Attackers Really Move – And 5 Steps to Make Their Job Much Harder
Gali Rahamim | June 18, 2025

When non-cyber people imagine a cyberattack, they often picture a dramatic breach through a flashy zero-day exploit or high-profile vulnerability. The truth is, as…

From Reactive to Resilient: Navigating the New Era of Cyber Compliance

Compliance isn’t a back-office task anymore – it’s at the heart of how organizations manage risk, ensure resilience, and build trust. For years, it…

Wondering How to Transform Complex Requirements into Sustainable Operations?

With each new regulation, security teams face the same challenge: turning complex requirements into practical, sustainable operations. Regardless of the regulation or certification, bridging…

The NIST Cybersecurity Framework 2.0 Checklist

The NIST Cybersecurity Framework (CSF) 2.0 is an updated version of NIST Cybersecurity Framework (NIST CSF), which was released in 2023. All versions of NIST aim…

Beyond the Checklist: Why Attackers Love Your Misconfigurations- And How to Stop Them
Batya Steinherz | May 29, 2025

Some of the worst breaches in recent years didn’t come from sophisticated malware or cutting-edge exploits. They came from something much simpler – somebody,…

Exposure Management in Retail: The Security Approach That Never Goes Out of Style
Daniel Hoffman | May 22, 2025

Retail changes fast – perhaps faster than any other customer-facing vertical. Online stores, mobile apps, and cloud-based operations are constantly evolving and improving. But…

PCI Compliance Checklist

PCI (Payment Card Industry) Compliance outlines a set of requirements for securing credit card transactions and protecting cardholder data. Any merchant processing, storing, or…

Bridging Theory and Practice: How Continuous Security Controls Optimization Complements Proactive Defense and Posture Management
Dale Fairbrother | May 15, 2025

A report was recently published by Gartner®: Reduce Threat Exposures with Security Controls Optimization. This new report discusses how, in their viewpoint, the growing…

1 2 3 42

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.