The 3 Big Questions CISOs Ask Themselves
I recently had the pleasure of meeting with several CISOs and cybersecurity leaders across multiple verticals at the Innovate Cybersecurity…
Blog
5 Ways to Make Attack Path Management More Manageable
Effective cybersecurity can be distilled to a single idea: Protect your most business critical assets. Protecting your most critical assets,…
Blog
The Need of Prioritization: If Everything Is “Mission Critical”… Then Nothing Is
Humans have always been intrigued by paradoxes and puzzles. The ancient Greeks, from Plato to Plutarch, debated whether if you…
Blog
How to Establish an Effective Security Risk Assessment Plan
It’s been said that measuring something is the first step toward understanding, controlling and improving it. In the case of cybersecurity,…
Blog
See XM Cyber In Action