Resources

From Alerts to Action: Streamlining Remediation Operations with Continuous Exposure Management

Security teams face an unprecedented challenge; Attackers are moving faster than ever before, and the proliferation of openly-available AI-powered attack…
Blog

What are Exposure Assessment Platforms?

What are Exposure Assessment Platforms (EAP)? Exposure Assessment Platforms (EAPs) are a new, consolidated category of security solutions coined by…
Glossary

Flipping the Script: Seeing Risk the Way Attackers Do

As someone coming from an application security background, stepping into the world of Exposure Management has been both exciting and…
Blog

Windows Server Update Service (WSUS) Critical Vulnerability: CVE-2025-59287 Under Active Exploitation

Overview Microsoft has disclosed a critical remote code execution (RCE) vulnerability in Windows Server Update Service (WSUS), tracked as CVE-2025-59287.…
Blog

XM Cyber Helps Jerusalem Municipality Strengthen Security and Gain Visibility

When Yonatan Grunwald joined the Jerusalem Municipality as an information security expert, his first priority was clear. He needed to…
Case Studies

XM Cyber Helps Lidl Spain Focus on What Matters Most

For Josep Mulero, Information Security Officer at Lidl Spain, the challenge was clear: traditional tools generated a flood of data,…
Case Studies

XM Cyber Helps Golf Club St. Leon-Rot Gain Visibility and Strengthen IT Security

Golf Club St. Leon-Rot is one of the most well-known golf clubs in Germany. For Johannes Hofmann, the club’s IT…
Case Studies

Cracking the Boardroom Code: A New Path for CISOs 

CISOs dedicate entire careers to mastering security. With a skill set expertly tuned to spotting threats, building defenses, and maintaining…
Blog

CRITICAL ALERT: Oracle E-Business Suite Zero-Day Vulnerability, CVE-2025-61882, Under Active Exploitation!

Overview Oracle has just disclosed that a critical zero-day vulnerability, tracked as CVE-2025-61882, has been identified in Oracle E-Business Suite…
Blog

Can CTEM Address the Hidden Gaps in Your PAM Program?

Traditional Privileged Access Management (PAM) solutions have long played a critical role in identity security. They are the cornerstone of…
Blog

Stop Wasting Time on Endless Exposures. Fix What Matters.

Tired of endless lists of exposures that don’t show what really matters? As attack surfaces grow, the volume of exposures…
Videos

Zero Trust & Exposure Management: Your Path to Proactive Security

Join our live AMA to learn how the two work together to build a resilient security posture.
Webinars
1 3 4 5 6 7 47

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.