Resources

Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity

Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own…
Blog

XM Cyber and Google SecOps: Turning Context into Action

Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert…
Blog

XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment

We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability…
Blog

XM Cyber For Exposed Credentials Management

Protect Your Business from Stolen Credentials Before They are Exploited Leverage near real-time alerts of external breaches that compromise your…
Solution Briefs

One Year Later: The Tangible ROI of Exposure Management After Year One

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen…
Blog

Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack

Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being…
Blog

XM Cyber & IQUW: Focusing Effort Where it Matters Most

As Group CISO of luxury re-insurer IQUW, industry veteran Stephen Owens knows it’s impossible to fix all issues that could…
Case Studies

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex…
Blog

How to Align Exposure Management with Your True Business Risk

Join XM Cyber Principal Customer Advisor, Yaron Mazor, for a fascinating and informative webinar on XM Cyber’s four-step journey to…
Webinars

Unifying Cybersecurity Posture: Why A Digital Twin Approach Outperforms Traditional Data Aggregation

Securing an increasingly complex threat landscape is really hard and today, organizations face a major challenge: turning this ever-growing flood…
Blog

How Attackers Really Move – And 5 Steps to Make Their Job Much Harder

When non-cyber people imagine a cyberattack, they often picture a dramatic breach through a flashy zero-day exploit or high-profile vulnerability.…
Blog

From Reactive to Resilient: Navigating the New Era of Cyber Compliance

Compliance isn’t a back-office task anymore – it’s at the heart of how organizations manage risk, ensure resilience, and build…
eBooks & Whitepapers
1 3 4 5 6 7 46

Request a demo

See what attackers see, so you can stop them from doing what attackers do.