Your Supply Chain Is an Attack Surface – Here’s How to Secure It
Supply chains are a favorite target for attackers. Every vendor, partner, and service provider adds new ways into your sensitive systems – many of…
What is a Digital Twin in Cybersecurity?
What is a Digital Twin in Cybersecurity? A digital twin is a live model of an organization’s environment. It shows how systems, users, and…
Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity
Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own tools to the workplace,…
XM Cyber and Google SecOps: Turning Context into Action
Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert demands attention, yet it’s…
XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment
We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment. This isn’t something…
XM Cyber For Exposed Credentials Management
Protect Your Business from Stolen Credentials Before They are Exploited Leverage near real-time alerts of external breaches that compromise your employees’ credentials and digital…
One Year Later: The Tangible ROI of Exposure Management After Year One
In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen focus, accelerate response times,…
Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack
Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being actively exploited in the…
XM Cyber & IQUW: Focusing Effort Where it Matters Most
As Group CISO of luxury re-insurer IQUW, industry veteran Stephen Owens knows it’s impossible to fix all issues that could put a business at…
The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions
When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex and years in the…
How to Align Exposure Management with Your True Business Risk
Join XM Cyber Principal Customer Advisor, Yaron Mazor, for a fascinating and informative webinar on XM Cyber’s four-step journey to align Exposure Management with…
Unifying Cybersecurity Posture: Why A Digital Twin Approach Outperforms Traditional Data Aggregation
Securing an increasingly complex threat landscape is really hard and today, organizations face a major challenge: turning this ever-growing flood of data into actionable…