What is Cloud Security Compliance?
Cloud migration and the popularity of AWS, Azure and other Infrastructure-as-a-Service providers have created myriad new data security challenges for today’s businesses. Cloud security…
Our security is only as strong as our ability to manage it: The necessity of Attack Path Management for the Hybrid Cloud
Now it’s no secret businesses have ramped up and driven the adoption of the cloud faster than any period previously. One of the key…
What is Threat Simulation?
Often the best way to defend against a threat is to assume the perspective of an attacker. By modeling how a cyber-adversary is likely…
The XM Cyber 2022 Attack Path Management Impact Report
The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million entities to bring insights…
5 Ways to Make Attack Path Management More Manageable
Effective cybersecurity can be distilled to a single idea: Protect your most business critical assets. Protecting your most critical assets, in turn, can be…
XM Cyber Advisory – Spring4Shell, Zero Day
Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability affects Spring Framework which…
2022 Attack Path Management Impact Report
The XM Cyber 2022 Attack Path Management Impact Report is the industry’s first annual report that reveals the likelihood and impact of a breach,…
New Privilege Escalation Techniques are Compromising your Google Cloud Platform
In this research you’ll discover some of the common attack techniques used in Google Cloud Platform (GCP) to better understand how an attacker exploits…
Introduction: See All Ways
Despite all the resources companies devote to cybersecurity most can’t answer the simple question: “Is our business secure?”. To overcome this big disconnect, organizations…
Video: Plymouth Rock achieves vulnerability prioritization with XM Cyber to focus on the right remediation
Plymouth Rock has a committed team working hard to ensure the company’s critical assets remain secure. To accomplish this, the team utilizes tools from…
See All Ways: How to Overcome the Big Disconnect in Cybersecurity
Today’s reality in cybersecurity is that, with the right combination of tools, you may be able to see all kinds of misconfigurations … and…
XM Cyber for Amazon Inspector
Layering on XM Cyber attack path visibility provides actionable detail to help customers prioritize their remediation efforts and quickly respond to protect critical resources…
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.