Resources

Can CTEM Address the Hidden Gaps in Your PAM Program?
Craig Boyle & Yaron Mazor | September 21, 2025

Traditional Privileged Access Management (PAM) solutions have long played a critical role in identity security. They are the cornerstone of a zero-trust model, designed…

Stop Wasting Time on Endless Exposures. Fix What Matters.

Tired of endless lists of exposures that don’t show what really matters? As attack surfaces grow, the volume of exposures grows too- from CVEs…

Zero Trust & Exposure Management: Your Path to Proactive Security

Join our live AMA to learn how the two work together to build a resilient security posture.

Case Study: Yaron King, Senior Cybersecurity Specialist

Hear from Yaron King, a Senior Cybersecurity Specialist at a government institution, as he shares why his team chose the XM Cyber platform. Yaron…

How Equiniti Reduced Risk and Streamlined Security with XM Cyber

Equiniti provides financial administration services for large corporations, including pensions, shareholder management, and payments. The company handles sensitive financial and personal data, and security…

Your Supply Chain Is an Attack Surface – Here’s How to Secure It
Jason Fruge | September 07, 2025

Supply chains are a favorite target for attackers. Every vendor, partner, and service provider adds new ways into your sensitive systems – many of…

What’s a Digital Twin?

What is a Digital Twin? A digital twin is a live model of an organization’s environment. It shows how systems, users, and assets connect…

Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity
Zur Ulianitzky & Peled Eldan | August 20, 2025

Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own tools to the workplace,…

XM Cyber and Google SecOps: Turning Context into Action
August 18, 2025

Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert demands attention, yet it’s…

XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment
Batya Steinherz | August 07, 2025

We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment. This isn’t something…

XM Cyber For Exposed Credentials Management

Protect Your Business from Stolen Credentials Before They are Exploited Leverage near real-time alerts of external breaches that compromise your employees’ credentials and digital…

One Year Later: The Tangible ROI of Exposure Management After Year One
Jason Fruge & Caleb Jones | July 27, 2025

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen focus, accelerate response times,…

1 2 3 4 5 45

See what attackers see, so you can stop them from doing what attackers do.