Resources

Top 10 Favorite Cybersecurity Podcasts
Shahar Solomon | May 02, 2023

As a cybersecurity professional, it’s important for me to stay current and on top of trending events. But to be honest, the cyber world…

XM Cyber Continuous Exposure Management Platform Demo

It’s time to change the way you work, and stop wasting time on fixes that don’t impact risk. In this video we will introduce…

Case Study: Cyber Guard

If you are an MSSP looking to give your customers continuous, real-time in depth knowledge of what to fix in their environments, check out…

Why Focusing on Choke Points Can Help Solve Your Resource Constraints
Michael Greenberg | April 13, 2023

Managing and remediating cyber exposures is no simple task.  Trying to keep up with myriad vulnerabilities and exposures is difficult and overwhelming (to say…

Research Report: 2023 State of Exposure Management

Don’t miss out on exclusive research that explores the challenges organizations face in managing security exposures and provides insights on how to overcome them….

Establishing a Modern Exposure Management Program

This session provides a comprehensive overview of the evolution of vulnerability management and explains why critical vulnerabilities do not necessarily equal risk. By watching…

Want to build a modern exposure management program?

Everybody knows about the challenges with trying to manage a never ending tide of vulnerabilities; a constantly growing list makes it difficult to prioritize…

CVE-2023-23397 – Outlook vulnerability
Zur Ulianitzky & David Azria & Bill Ben Haim | March 16, 2023

On March 14, Microsoft released the regular Patch tuesday. During this patch Tuesday, Microsoft released 74 new patches addressing CVEs within Microsoft products. Exploiting…

CVE 2023-21716- Microsoft Word RCE
Zur Ulianitzky & David Azria & Bill Ben Haim | March 07, 2023

Overview On March 5, a security researcher named Joshua J.Drake shared details about CVE-2023-21716, a Microsoft Word vulnerability that was patched during February 2023…

Identity-based Exposures – 4 Ways to Prevent Them
Karin Feldman | March 07, 2023

Weak credentials and overly permissive privileges get leveraged in attacks all the time. Here’s what to do about it. Today, one of the most…

Want to save >$14M over 3 years?

Nearly every enterprise on the planet has tools to address vulnerabilities. But how can you understand the ROI of your efforts? We commissioned Forrester…

Continuous Compliance:

Where Security’s Rubber Meets Compliance’s Road

Shimon Becker | February 28, 2023

How compliance can strengthen security and security can strengthen compliance Compliance and security, though not at all the same, are actually two sides of…

1 6 7 8 9 10 34

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.