Resources

One Year Later: The Tangible ROI of Exposure Management After Year One

In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. It’s supposed to sharpen…
Blog

Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability “ToolShell” Under Active Attack

Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being…
Blog

XM Cyber & IQUW: Focusing Effort Where it Matters Most

As Group CISO of luxury re-insurer IQUW, industry veteran Stephen Owens knows it’s impossible to fix all issues that could…
Case Studies

The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions

When it comes to mergers and acquisitions, every scenario is different – some are relatively straightforward, while others are complex…
Blog

How to Align Exposure Management with Your True Business Risk

Join XM Cyber Principal Customer Advisor, Yaron Mazor, for a fascinating and informative webinar on XM Cyber’s four-step journey to…
Webinars

Unifying Cybersecurity Posture: Why A Digital Twin Approach Outperforms Traditional Data Aggregation

Securing an increasingly complex threat landscape is really hard and today, organizations face a major challenge: turning this ever-growing flood…
Blog

How Attackers Really Move – And 5 Steps to Make Their Job Much Harder

When non-cyber people imagine a cyberattack, they often picture a dramatic breach through a flashy zero-day exploit or high-profile vulnerability.…
Blog

From Reactive to Resilient: Navigating the New Era of Cyber Compliance

Compliance isn’t a back-office task anymore – it’s at the heart of how organizations manage risk, ensure resilience, and build…
eBooks & Whitepapers

Wondering How to Transform Complex Requirements into Sustainable Operations?

With each new regulation, security teams face the same challenge: turning complex requirements into practical, sustainable operations. Regardless of the…
eBooks & Whitepapers

The NIST Cybersecurity Framework 2.0 Checklist

The NIST Cybersecurity Framework (CSF) 2.0 is an updated version of NIST Cybersecurity Framework (NIST CSF), which was released in 2023. All…
Checklists

Beyond the Checklist: Why Attackers Love Your Misconfigurations- And How to Stop Them

Some of the worst breaches in recent years didn’t come from sophisticated malware or cutting-edge exploits. They came from something…
Blog

Exposure Management in Retail: The Security Approach That Never Goes Out of Style

Retail changes fast – perhaps faster than any other customer-facing vertical. Online stores, mobile apps, and cloud-based operations are constantly…
Blog
1 4 5 6 7 8 47

Request a demo

See what attackers see, so you can stop them from doing what attackers do.