Resources

XM Cyber Exposure Management Service

Reduce Cyber Risk and Maximize Your ROI with the Hands-on Management Services. In the face of seemingly overwhelming security threats,…
Solution Briefs

Fix what matters with XM Cyber

75% of exposures aren’t on attack paths. See how exposures come together through the eyes of an attacker and slash…
Videos

Kubernetes Continuous Exposure Management

With XM Cyber’s Kubernetes Exposure Management, you can finally see and eliminate attack paths across your container environments. In recent…
Solution Briefs

Here is What We’re Thankful for This Thanksgiving

Thanksgiving is the perfect opportunity to focus on, well, being thankful.  It’s a time to reflect on the bounty we…
Blog

CVE-2023-46604 – Remote Code Execution (RCE) Flaw in Apache ActiveMQ

On Oct 27th, open-source web server software provider Apache disclosed a new vulnerability with a CVSS score of 10, which…
CVE Advisory

One Top-Tier Automotive Giant, Two Dangerous Attack Paths

It likely comes as no great surprise – cybersecurity is a paramount concern in the automotive industry.  For all of…
Blog

A Practical Guide to Getting Started With CTEM

If you spend your working time in the vulnerability and exposure management space, chances are you’ve heard about the Continuous…
eBooks & Whitepapers

The TIBER-EU Framework: Here’s What You Need to Know

Compliance frameworks aren’t always the most fascinating of topics, but they are always important topics. Today we’re looking at TIBER-EU…
Blog

Now That Cyber Awareness Month is Over, Don’t Forget These Tips and Best Practices

When it comes to cyber awareness, a lot of professionals (you, perhaps?) may assume that being “in the know” means…
Blog

Top Attack Paths in AWS and How to Efficiently Remediate Exposure

As organizations move workloads to the cloud, new and complex attack paths emerge across the hybrid cloud environment. Knowing which…
Webinars

Gartner Trends: In 2024, CTEM is Top Priority for Enterprises

Well, it’s almost the end of the year and you know what that means?  It’s time for all the predictions/wrap…
Blog
Microsoft Entra ID Attack Paths

New Name, Same Risks: Two Microsoft Entra ID Attack Paths

For those not yet aware, Microsoft Entra ID is the new name for Azure AD, just announced this July. By…
Blog
1 15 16 17 18 19 47

Request a demo

See what attackers see, so you can stop them from doing what attackers do.