XM Cyber Accelerates Expansion into US and Significantly increases Total Contract Value (TCV) in 2023
Veteran Sales Executive Kent Rounds, formerly of CrowdStrike, joins as XM Cyber VP US Sales, to unlock the potential of key partnerships and to…
XM Cyber: How This Hybrid Cloud Security Company Is Closing the Exposure Remediation Gap
XM Cyber is a leading hybrid cloud security company changing how organizations approach cyber risk. Pulse 2.0 interviewed XM Cyber Chief Technology Officer and…
XM Cyber Introduces First Exposure Management Solution Working Across Environments
XM Cyber, a leader in hybrid cloud exposure management, announced new capabilities that provide complete and continuous visibility into risks and vulnerabilities in Kubernetes…
Securing Active Directory and Azure AD
For more than two decades, Active Directory (AD) has been the default identity and access management service in Windows networks. As enterprises have shifted to the…
Critical Assets Highly Exposed in Public Cloud, Mobile, and Web Apps
CyCognito has released its semi-annual State of External Exposure Management Report, revealing a staggering number of vulnerable public cloud, mobile, and web applications exposing sensitive…
Report Reveals Alarming Cloud Misconfiguration and Exposed Assets
In a bid to shed light on the risks and best practices associated with cloud computing, Qualys has unveiled the 2023 Qualys Cloud Security…
Diagnostic fatigue is causing havoc on cyber efficiency
We can all agree that the effective detection and diagnosis of security threats is a fundamental component of cyber resilience. After all, you cannot…
20 Hottest New Cybersecurity Tools At Black Hat 2023
At Black Hat 2023 this week, vendors are showcasing new products in segments including XDR, application security, vulnerability management and cloud security.
Understanding Active Directory Attack Paths to Improve Security
Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies…
Unveiling the Hacker’s Mind: Insights into the Future of Cybersecurity
The landscape of cybersecurity is constantly evolving, with emerging technologies reshaping the way we protect our digital infrastructure. One such technology that has garnered…
What is cloud security? Fundamental guide
Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to…
Focus Security Efforts on Choke Points, Not Visibility
By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.
Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.