Attack Techniques in Okta – Part 1 – A (Really) Deep Dive into Okta Key Terms
Welcome to the first installment of our blog series on attack techniques within Okta. Okta is an identity management service…
Blog
Using GenAI to Improve Cybersecurity, with Privacy at the Forefront
In this digital age, cybersecurity has become essential to every organization’s operations and an integral part of our consciousness as…
Blog
The XM Cyber 2022 Attack Path Management Impact Report
The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million…
Blog
See XM Cyber In Action