Resources

Case Study: Yaron King, Senior Cybersecurity Specialist

Hear from Yaron King, a Senior Cybersecurity Specialist at a government institution, as he shares why his team chose the…
Case Studies

How Equiniti Reduced Risk and Streamlined Security with XM Cyber

Equiniti provides financial administration services for large corporations, including pensions, shareholder management, and payments. The company handles sensitive financial and…
Case Studies

Your Supply Chain Is an Attack Surface – Here’s How to Secure It

Supply chains are a favorite target for attackers. Every vendor, partner, and service provider adds new ways into your sensitive…
Blog

What’s a Digital Twin?

What is a Digital Twin? A digital twin is a live model of an organization’s environment. It shows how systems,…
Glossary

Shadow AI is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity

Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own…
Blog

XM Cyber and Google SecOps: Turning Context into Action

Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert…
Blog

XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights™ Voice of the Customer for Vulnerability Assessment

We’re thrilled to share that XM Cyber is recognized in the Gartner Peer Insights™ Voice of the Customer for Vulnerability…
Blog

XM Cyber For Exposed Credentials Management

Protect Your Business from Stolen Credentials Before They are Exploited Leverage near real-time alerts of external breaches that compromise your…
Solution Briefs

One Year Later: The Tangible ROI of Exposure Management After Year One

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen…
Blog

Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack

Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being…
Blog

XM Cyber & IQUW: Focusing Effort Where it Matters Most

As Group CISO of luxury re-insurer IQUW, industry veteran Stephen Owens knows it’s impossible to fix all issues that could…
Case Studies

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex…
Blog
1 4 5 6 7 8 47

See XM Cyber In Action

See what attackers see, so you can stop them from doing what attackers do.