Resources

Decrypting VMware Workstation Passwords for Fun

Overview At XM Cyber, we have been hard at work on the techniques that attackers use against your VMware environments.…
Blog

What is Cybersecurity Performance Management?

The process of cybersecurity performance management helps an organization understand how well it is meeting its cybersecurity objectives. Because conventional…
Glossary
Cloud Security Compliance

What is Cloud Security Compliance?

Cloud migration and the popularity of AWS, Azure and other Infrastructure-as-a-Service providers have created myriad new data security challenges for…
Glossary

Our security is only as strong as our ability to manage it: The necessity of Attack Path Management for the Hybrid Cloud

Now it’s no secret businesses have ramped up and driven the adoption of the cloud faster than any period previously.…
Blog

What is Threat Simulation?

Often the best way to defend against a threat is to assume the perspective of an attacker. By modeling how…
Glossary

The XM Cyber 2022 Attack Path Management Impact Report

The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million…
Blog
5 Ways to Make Attack Path Management More Manageable

5 Ways to Make Attack Path Management More Manageable

Effective cybersecurity can be distilled to a single idea: Protect your most business critical assets. Protecting your most critical assets,…
Blog

XM Cyber Advisory – Spring4Shell, Zero Day

Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability…
Blog

2022 Attack Path Management Impact Report

The XM Cyber 2022 Attack Path Management Impact Report is the industry’s first annual report that reveals the likelihood and…
eBooks & Whitepapers

New Privilege Escalation Techniques are Compromising your Google Cloud Platform

In this research you’ll discover some of the common attack techniques used in Google Cloud Platform (GCP) to better understand…
Blog

Introduction: See All Ways

Despite all the resources companies devote to cybersecurity most can’t answer the simple question: “Is our business secure?”. To overcome…
Videos

Case Study: Plymouth Rock Achieves Vulnerability Prioritization With XM Cyber to Focus on What Matters

Plymouth Rock has a committed team working hard to ensure the company’s critical assets remain secure. To accomplish this, the…
Case Studies
1 24 25 26 27 28 47

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.