Resources

A Comprehensive Guide to Getting and Calculating Cybersecurity CPE Credits

“Keeping up with my CPE credits is my favorite part of my job.” Said no one. Ever.  Continuing Professional Education…
Blog

From Vulnerability Management to Exposure Management

Vulnerability management has long been a security program cornerstone, with the goal of trying to address vulnerabilities as they are…
eBooks & Whitepapers

CVE-2023-34362 – Critical Zero-Day Vulnerability Found in Popular MOVEIt Transfer Software

XM Cyber’s Research team is closely observing the emergence of a zero-day vulnerability in Progress Software’s popular managed file transfer…
CVE Advisory

The GenAI Train has Left the Station: It’s Time to Secure the Tracks

The adoption of generative AI in business introduces significant security and privacy risks. The ability to create convincing fake content…
Blog

Go from Navigating The Paths of Risk: The State of Exposure Management in 2023 Webinar

Did you know that 71% of organizations have exposures that can allow attackers to pivot from on-prem to cloud?
Webinars

The Anatomy of a Healthcare Cyberattack: Two True Stories

It’s no secret that the healthcare industry is a prime target for attackers. According to research from Check Point, healthcare…
Blog

The Cloud is Just Half the Problem

With many organizations making their shift to the cloud, a clear “cloud first” mentality has become prevalent among security professionals.…
Blog

Enabling Continuous Exposure Remediation Efficiency with XM Cyber

By addressing just 2% of exposures that lie on choke points, you can eliminate multiple attack paths to critical assets.…
Videos

XM Cyber Continuous Exposure Management Platform Demo

It’s time to change the way you work, and stop wasting time on fixes that don’t impact risk. In this…
Videos

Case Study: How XM Cyber Grants MSSP Cyber Guard׳s Customers Continuous, Real-Time Knowledge

If you are an MSSP looking to give your customers continuous, real-time in depth knowledge of what to fix in…
Case Studies

Why Focusing on Choke Points Can Help Solve Your Resource Constraints

Managing and remediating cyber exposures is no simple task.  Trying to keep up with myriad vulnerabilities and exposures is difficult…
Blog

Research Report: 2023 State of Exposure Management

Don’t miss out on exclusive research that explores the challenges organizations face in managing security exposures and provides insights on…
eBooks & Whitepapers
1 18 19 20 21 22 47

Request a demo

See what attackers see, so you can stop them from doing what attackers do.