Resources

The Anatomy of a Healthcare Cyberattack: Two True Stories

It’s no secret that the healthcare industry is a prime target for attackers. According to research from Check Point, healthcare…
Blog

The Cloud is Just Half the Problem

With many organizations making their shift to the cloud, a clear “cloud first” mentality has become prevalent among security professionals.…
Blog

Enabling Continuous Exposure Remediation Efficiency with XM Cyber

By addressing just 2% of exposures that lie on choke points, you can eliminate multiple attack paths to critical assets.…
Videos

XM Cyber Continuous Exposure Management Platform Demo

It’s time to change the way you work, and stop wasting time on fixes that don’t impact risk. In this…
Videos

Case Study: How XM Cyber Grants MSSP Cyber Guard׳s Customers Continuous, Real-Time Knowledge

If you are an MSSP looking to give your customers continuous, real-time in depth knowledge of what to fix in…
Case Studies

Why Focusing on Choke Points Can Help Solve Your Resource Constraints

Managing and remediating cyber exposures is no simple task.  Trying to keep up with myriad vulnerabilities and exposures is difficult…
Blog

Research Report: 2023 State of Exposure Management

Don’t miss out on exclusive research that explores the challenges organizations face in managing security exposures and provides insights on…
eBooks & Whitepapers

Establishing a Modern Exposure Management Program

This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessarily…
Webinars

Want to build a modern exposure management program?

Everybody knows about the challenges with trying to manage a never ending tide of vulnerabilities; a constantly growing list makes…
eBooks & Whitepapers

CVE-2023-23397 – Outlook vulnerability

On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs…
CVE Advisory

CVE 2023-21716- Microsoft Word RCE

Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was…
CVE Advisory

Identity-based Exposures – 4 Ways to Prevent Them

Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today,…
Blog
1 19 20 21 22 23 47

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.