Resources

The Five Steps of CTEM, Part 1: Scoping – Risk and Impact
Maya Malevich | January 18, 2024

Welcome to the first installment of our five-part journey through the stages of Continuous Threat Exposure Management (CTEM). In this series, I’ll take you…

New XM Cyber Survey: How Organizations Secure Their Digital Frontiers
Batya Steinherz | January 11, 2024

The digital world has become a battleground. In recent years, cyberattacks have continued to grow in frequency, scope, sophistication and impact. Despite monumental efforts…

Survey: 2024 State of Security Posture Report

In 2023, 82% of orgs experienced an increase in the gap between exposures and their ability to address them.

Swiss IT Security Group: An MSSP Case Study

This captivating case study video showcases Swiss IT Technology Group and XM Cyber, highlighting our successful MSSP partnership. Gain valuable insights into how our…

In-house Expert Roundup: It’s Prediction Time – Watch for Subtle Shifts and Seismic Changes in 2024
Batya Steinherz | January 01, 2024

The end of the year has snuck up on us again. And as we do every year, we’ve turned to our in-house XM Cyber…

Identifying risky credentials and permissions with XM Cyber

Learn how low level roles can escalate privileges in just 3 steps and how to prevent it with XM Cyber.

Continuous Exposure Management Platform

Focus on fixing your most critical exposures. With XM Cyber, you can identify all vulnerabilities, misconfigurations, and credential issues to see how they chain…

The Key to Building Cyber Resilience for MSSPs
Craig Boyle | December 17, 2023

Cybersecurity awareness is transforming every aspect of the organizational landscape. Cybersecurity is no longer relegated to security backrooms – it is front and center…

CVE-2023-50164 – Remote Code Execution (RCE) Flaw in Apache Struts
Zur Ulianitzky |

On Dec 7th, open-source web server software provider Apache disclosed a new vulnerability with a CVSS score of 9.8, which is currently being tracked…

Using Kubernetes Raises Security Stakes: Three Attack Paths
Zur Ulianizky & Karin Feldman | December 07, 2023

There’s really no question when it comes to which container orchestration platform leads the market – yeah you guessed it, It’s Kubernetes. In recent…

Bridging the Cybersecurity Skills Gap: A Fireside Chat on the Future of the Cybersecurity Workforce

Join this fascinating fireside chat on December 13th and dive into the state of the cybersecurity skills gap. With insights from industry veterans, explore…

XM Cyber Exposure Management Service

Reduce Cyber Risk and Maximize Your ROI with the Hands-on Management Services. In the face of seemingly overwhelming security threats, organizations are struggling to…

1 5 6 7 8 9 38

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.