Resources

Attack Techniques in Okta – Part 1 – A (Really) Deep Dive into Okta Key Terms

Welcome to the first installment of our blog series on attack techniques within Okta. Okta is an identity management service…
Blog

Using GenAI to Improve Cybersecurity, with Privacy at the Forefront

In this digital age, cybersecurity has become essential to every organization’s operations and an integral part of our consciousness as…
Blog

The XM Cyber 2022 Attack Path Management Impact Report

The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million…
Blog

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.