Glossary

What is Continuous Controls Monitoring?
August 02, 2022

Critical Security Controls (CSCs) are a recommended set of actions for cybersecurity that provide ways to help prevent and stop attacks on critical data…

What is Attack Surface Management?
XM Cyber | May 31, 2022

An attack surface is the sum of all points where an organization is vulnerable to cyber-attackers, including all attack vectors where an adversary can…

What is Cybersecurity Performance Management?
XM Cyber | May 23, 2022

The process of cybersecurity performance management helps an organization understand how well it is meeting its cybersecurity objectives. Because conventional performance management metrics (such…

What is Cloud Security Compliance?
XM Cyber | May 22, 2022

Cloud migration and the popularity of AWS, Azure and other Infrastructure-as-a-Service providers have created myriad new data security challenges for today’s businesses. Cloud security…

What is Threat Simulation?
XM Cyber | May 03, 2022

Often the best way to defend against a threat is to assume the perspective of an attacker. By modeling how a cyber-adversary is likely…

What are Attack Graphs?
XM Cyber | February 28, 2022

  A cyber attack graph is a representation of all possible paths of attack against a cybersecurity network, illustrating a state where an attacker…

What is an Attack Surface?
XM Cyber | February 14, 2022

An attack surface can be defined as anywhere and everywhere an organization is vulnerable to cyber-attacks. This includes all possible attack vectors where an…

What is Risk-Based Vulnerability Management?
XM Cyber | February 14, 2022

Risk-based Vulnerability Management (RBVM) is a cybersecurity strategy designed to help organizations limit risk through the strategic prioritization of vulnerability remediation. To accomplish this,…

What is Common Vulnerability Scoring System?
XM Cyber | February 14, 2022

The Common Vulnerability Scoring System (CVSS) is an open framework used by organizations across the world to determine the severity of cybersecurity vulnerabilities. These…

What is Cybersecurity Posture?
XM Cyber | February 14, 2022

Cybersecurity threats and organizational challenges related to information security are becoming more complex by the minute. To understand these elements at a high level…

What is Cyber Risk Score?
XM Cyber | February 14, 2022

Having a strong security posture is a core objective for modern organizations. Yet measuring the strength of these postures is often challenging, given their…

What is Hybrid Cloud Security?
XM Cyber | February 14, 2022

Hybrid cloud security aims to protect applications, data, infrastructure and other elements across an IT infrastructure that includes multiple environments, including at least one…

1 2

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.