Resources

Establishing a Modern Exposure Management Program

This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessarily…
Webinars

Want to build a modern exposure management program?

Everybody knows about the challenges with trying to manage a never ending tide of vulnerabilities; a constantly growing list makes…
eBooks & Whitepapers

CVE-2023-23397 – Outlook vulnerability

On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs…
CVE Advisory

CVE 2023-21716- Microsoft Word RCE

Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was…
CVE Advisory

Identity-based Exposures – 4 Ways to Prevent Them

Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today,…
Blog

Want to save >$14M over 3 years?

Nearly every enterprise on the planet has tools to address vulnerabilities. But how can you understand the ROI of your…
Webinars

Continuous Compliance:

Where Security’s Rubber Meets Compliance’s Road

How compliance can strengthen security and security can strengthen compliance Compliance and security, though not at all the same, are…
Blog

2022’s Most Potent Attack Paths

Attackers don’t think like you do. They’re looking for ways to bypass your security controls and take advantage of various…
eBooks & Whitepapers

How Financial Services Institutions Are Tackling Continuous Exposure Management

Leading Financial Services institutions are proactively identifying their most high-risk exposures with an Exposure Management platform. This post recounts 4…
Blog

Understanding ‘Lone Wolf’ Attacks Dissecting and Modeling 2022’s Most Powerful Cyber Attacks

The second half of 2022 saw a dramatic increase in ‘lone wolf’ attacks and can be coined one of the…
Webinars

From Our Experts: 14 Tips to Reduce Your Exposure to Ransomware

At XM Cyber, we’re all about reducing your cyber exposures to protect your attack surface. There are quite obviously loads…
Blog

IBM -Cyber Exposure Management Guide

IBM, in conjunction with XM Cyber created their new guide, Cyber Exposure Management: You Can’t Protect What You Don’t Know.…
eBooks & Whitepapers
1 19 20 21 22 23 47

Request a demo

See what attackers see, so you can stop them from doing what attackers do.