Resources

XM Cyber for Microsoft Defender for Endpoint — Add Context to Reduce Investigation Time, Protect Critical Assets and Lower Cyber Risk

Integrating XM Cyber with Microsoft Defender for Endpoint (MDE) gives customers detailed information on potential attack paths that might result…
Blog

See the Potential Impact of Every Crowdstrike Falcon Incident and How to Fix It

Enhance your Crowdstrike Falcon strategy by adding the accurate information your team needs to truly understand the risk of every…
Blog

Protecting Your Organization’s Crown Jewels In the Midst of a Pandemic Is No Joke This April Fools’ Day

Jokes are serious business — and there is no better example than April Fools’ Day, which has become synonymous with…
Blog

Stop Ransomware Before It Happens by Closing All the Gaps That Hackers Can Use to Infiltrate Your Network

Ransomware attackers don’t care about your company, your customers, or your intellectual capital. They only want to cripple you so…
Blog

Join XM Cyber’s Tamir Pardo and Gil Hazaz at Cybertech Dubai 2021

We are very glad to meet you at the 2021 in-person Cybertech Global event in Dubai, UAE, to be held…
Blog

The Next Generation of Breach and Attack Simulation: Add Context to Your Security Strategy with Attack-Centric Exposure Prioritization

Cybersecurity teams continue to be challenged by too many alerts, incident reports, vulnerability notices, and a growing list of potential…
Blog

Get the Context You Need to Lower Your Risk and Close Unknown Gaps in Your Cybersecurity

Networks change constantly and that creates challenges for IT and security operations. Gaps open exposing pathways that attackers can exploit.…
Blog

XM Cyber Attack Simulation Platform Enables Detection and Response to New Microsoft Exchange Zero-Day ProxyLogon

Just a few short weeks after the massive SolarWinds supply chain hack was made public, global organizations are now contending…
Blog

Join XM Cyber at Big SASIG 2021

XM Cyber is delighted to be attending this year’s Big SASIG virtual conference, to be held this year on March…
Blog

Privilege Escalation and Lateral Movement on Azure – Part 2

Overview This is the second part of XM Cyber series about privilege escalation and lateral movement on Microsoft Azure. Some…
Blog

Ransomware Attack Prevention

Discover cyber exposures that lead to successful ransomware attacks and prevent them in advance, with Exposure Management Ransomware groups are…
Solution Briefs

Take the Risk out of Digital Transformation

By providing the adversarial view, XM Cyber’s Exposure Management Platform helps organizations rise to the challenge of de-risking Digital Transformation…
Solution Briefs
1 31 32 33 34 35 47

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.