Newsroom

Topics

Report Reveals Alarming Cloud Misconfiguration and Exposed Assets

In a bid to shed light on the risks and best practices associated with cloud computing, Qualys has unveiled the 2023 Qualys Cloud Security…

XM Cyber Announces a distribution partnership with MEA Tec

Tel-Aviv, 27.8.23, MEA Tec. Distribution, a leading distributor of cybersecurity solutions in the Middle East, today announced a distribution partnership with XM Cyber, the…

Diagnostic fatigue is causing havoc on cyber efficiency

We can all agree that the effective detection and diagnosis of security threats is a fundamental component of cyber resilience. After all, you cannot…

20 Hottest New Cybersecurity Tools At Black Hat 2023

At Black Hat 2023 this week, vendors are showcasing new products in segments including XDR, application security, vulnerability management and cloud security.

XM Cyber Extends Continuous Exposure Management Capabilities

Company bolsters signature platform that eases the scoping, prioritization, validation and remediation of security exposures, by continuously evaluating threats from an attacker’s perspective.  …

Understanding Active Directory Attack Paths to Improve Security

Introduced in 1999, Microsoft Active Directory is the default identity and access management service in Windows networks, responsible for assigning and enforcing security policies…

Unveiling the Hacker’s Mind: Insights into the Future of Cybersecurity

The landscape of cybersecurity is constantly evolving, with emerging technologies reshaping the way we protect our digital infrastructure. One such technology that has garnered…

Companies of the Schwarz Group Partner Up with FC Bayern Munich

PreZero helps save resources by promoting circular economy at club venues Lidl’s own brand Saskia mineral water for players, hospitality fans, and Employees STACKIT…

What is cloud security? Fundamental guide

Don’t expect your network cybersecurity system to meet your needs in cloud computing. To protect your assets in a virtual environment, you need to…

Focus Security Efforts on Choke Points, Not Visibility

By finding the places where attack paths converge, you can slash multiple exposures in one fix for more efficient remediation.

3 Challenges in Building a Continuous Threat Exposure Management (CTEM) Program and How to Beat Them

If you’re a cybersecurity professional, you’re likely familiar with the sea of acronyms our industry is obsessed with. From CNAPP, to CWPP, to CIEM…

How ‘quick wins’ can boost cyber agility and resilience 

Cybersecurity has reached a major crossroads – and the paradigm for success has shifted. For years, the lack of control over, and visibility into…

1 2 3 4 27

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.