Case Study: How XM Cyber Grants MSSP Cyber Guard׳s Customers Continuous, Real-Time Knowledge
If you are an MSSP looking to give your customers continuous, real-time in depth knowledge of what to fix in…
Case Studies
Why Focusing on Choke Points Can Help Solve Your Resource Constraints
Managing and remediating cyber exposures is no simple task. Trying to keep up with myriad vulnerabilities and exposures is difficult…
Blog
Research Report: 2023 State of Exposure Management
Don’t miss out on exclusive research that explores the challenges organizations face in managing security exposures and provides insights on…
eBooks & Whitepapers
Establishing a Modern Exposure Management Program
This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessarily…
Webinars
Want to build a modern exposure management program?
Everybody knows about the challenges with trying to manage a never ending tide of vulnerabilities; a constantly growing list makes…
eBooks & Whitepapers
CVE-2023-23397 – Outlook vulnerability
On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs…
CVE Advisory
CVE 2023-21716- Microsoft Word RCE
Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was…
CVE Advisory
Identity-based Exposures – 4 Ways to Prevent Them
Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today,…
Blog
Want to save >$14M over 3 years?
Nearly every enterprise on the planet has tools to address vulnerabilities. But how can you understand the ROI of your…
Webinars
Continuous Compliance:
Where Security’s Rubber Meets Compliance’s Road
How compliance can strengthen security and security can strengthen compliance Compliance and security, though not at all the same, are…
Blog
2022’s Most Potent Attack Paths
Attackers don’t think like you do. They’re looking for ways to bypass your security controls and take advantage of various…
eBooks & Whitepapers
How Financial Services Institutions Are Tackling Continuous Exposure Management
Leading Financial Services institutions are proactively identifying their most high-risk exposures with an Exposure Management platform. This post recounts 4…
Blog
Request a demo