The Anatomy of a Healthcare Cyberattack: Two True Stories
It’s no secret that the healthcare industry is a prime target for attackers. According to research from Check Point, healthcare…
Blog
The Cloud is Just Half the Problem
With many organizations making their shift to the cloud, a clear “cloud first” mentality has become prevalent among security professionals.…
Blog
Enabling Continuous Exposure Remediation Efficiency with XM Cyber
By addressing just 2% of exposures that lie on choke points, you can eliminate multiple attack paths to critical assets.…
Videos
XM Cyber Continuous Exposure Management Platform Demo
It’s time to change the way you work, and stop wasting time on fixes that don’t impact risk. In this…
Videos
Case Study: How XM Cyber Grants MSSP Cyber Guard׳s Customers Continuous, Real-Time Knowledge
If you are an MSSP looking to give your customers continuous, real-time in depth knowledge of what to fix in…
Case Studies
Why Focusing on Choke Points Can Help Solve Your Resource Constraints
Managing and remediating cyber exposures is no simple task. Trying to keep up with myriad vulnerabilities and exposures is difficult…
Blog
Research Report: 2023 State of Exposure Management
Don’t miss out on exclusive research that explores the challenges organizations face in managing security exposures and provides insights on…
eBooks & Whitepapers
Establishing a Modern Exposure Management Program
This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessarily…
Webinars
Want to build a modern exposure management program?
Everybody knows about the challenges with trying to manage a never ending tide of vulnerabilities; a constantly growing list makes…
eBooks & Whitepapers
CVE-2023-23397 – Outlook vulnerability
On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs…
CVE Advisory
CVE 2023-21716- Microsoft Word RCE
Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was…
CVE Advisory
Identity-based Exposures – 4 Ways to Prevent Them
Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today,…
Blog
See XM Cyber In Action