Decrypting VMware Workstation Passwords for Fun
Overview At XM Cyber, we have been hard at work on the techniques that attackers use against your VMware environments.…
Blog
What is Cybersecurity Performance Management?
The process of cybersecurity performance management helps an organization understand how well it is meeting its cybersecurity objectives. Because conventional…
Glossary
What is Cloud Security Compliance?
Cloud migration and the popularity of AWS, Azure and other Infrastructure-as-a-Service providers have created myriad new data security challenges for…
Glossary
Our security is only as strong as our ability to manage it: The necessity of Attack Path Management for the Hybrid Cloud
Now it’s no secret businesses have ramped up and driven the adoption of the cloud faster than any period previously.…
Blog
What is Threat Simulation?
Often the best way to defend against a threat is to assume the perspective of an attacker. By modeling how…
Glossary
The XM Cyber 2022 Attack Path Management Impact Report
The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million…
Blog
5 Ways to Make Attack Path Management More Manageable
Effective cybersecurity can be distilled to a single idea: Protect your most business critical assets. Protecting your most critical assets,…
Blog
XM Cyber Advisory – Spring4Shell, Zero Day
Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability…
Blog
2022 Attack Path Management Impact Report
The XM Cyber 2022 Attack Path Management Impact Report is the industry’s first annual report that reveals the likelihood and…
eBooks & Whitepapers
New Privilege Escalation Techniques are Compromising your Google Cloud Platform
In this research you’ll discover some of the common attack techniques used in Google Cloud Platform (GCP) to better understand…
Blog
Introduction: See All Ways
Despite all the resources companies devote to cybersecurity most can’t answer the simple question: “Is our business secure?”. To overcome…
Videos
Case Study: Plymouth Rock Achieves Vulnerability Prioritization With XM Cyber to Focus on What Matters
Plymouth Rock has a committed team working hard to ensure the company’s critical assets remain secure. To accomplish this, the…
Case Studies
See XM Cyber In Action