5 Ways to Make Attack Path Management More Manageable
Effective cybersecurity can be distilled to a single idea: Protect your most business critical assets. Protecting your most critical assets,…
Blog
XM Cyber Advisory – Spring4Shell, Zero Day
Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability…
Blog
2022 Attack Path Management Impact Report
The XM Cyber 2022 Attack Path Management Impact Report is the industry’s first annual report that reveals the likelihood and…
eBooks & Whitepapers
New Privilege Escalation Techniques are Compromising your Google Cloud Platform
In this research you’ll discover some of the common attack techniques used in Google Cloud Platform (GCP) to better understand…
Blog
Introduction: See All Ways
Despite all the resources companies devote to cybersecurity most can’t answer the simple question: “Is our business secure?”. To overcome…
Videos
Case Study: Plymouth Rock Achieves Vulnerability Prioritization With XM Cyber to Focus on What Matters
Plymouth Rock has a committed team working hard to ensure the company’s critical assets remain secure. To accomplish this, the…
Case Studies
See All Ways: How to Overcome the Big Disconnect in Cybersecurity
Today’s reality in cybersecurity is that, with the right combination of tools, you may be able to see all kinds…
Blog
XM Cyber for Amazon Inspector
Layering on XM Cyber attack path visibility provides actionable detail to help customers prioritize their remediation efforts and quickly respond…
Solution Briefs
The Necessity of Attack Path Management for the Hybrid Cloud
Published in collaboration with the UK Chapter of the Cloud Security Alliance, this whitepaper explores the necessity of attack path…
eBooks & Whitepapers
10 ways to gain control over Azure function app sites
Pen-testers! Red-teamers! We’ve prepared a bucket of new Azure techniques, specifically about Azure function app sites. In this blog,…
Blog
Choosing Attack Path Management Over Security Control Validation When Shopping for Breach & Attack Simulation
Breach and Attack Simulation is gaining lots of hype today. Yet simulating attacks can mean many different things and serve…
Blog
Go beyond Log4Shell and see the entire attack path with XM Cyber
We know you’re working tirelessly to get ahead of the log4j vulnerability. Here at XM Cyber, we can help you…
Videos
Request a demo