Newsroom

Topics

How many steps does it take for attackers to compromise critical assets?

The XM Cyber research team analyzed the methods, attack paths and impacts of attack techniques that imperil critical assets across on-prem, multi-cloud and hybrid environments.

New and less known cybersecurity risks you should be aware of

In this interview with Help Net Security, Zur Ulianitzky, Head of Security Research at XM Cyber, gives insights on new and less talked about cybersecurity risks organizations…

Four moves to ‘checkmate’ critical assets thanks to lax cloud security

Malicious actors can compromise 94% of critical assets within four steps of the initial breach point, according to a report

A Few Clicks from Data Disaster: The State of Enterprise Security

Once an organization has been breached, the overwhelming majority of critical assets are just a few attack techniques away from being compromised, according to…

XM Cyber Research Finds That Hackers Can Claim ‘Checkmate’ on 94% of Critical Assets in Just Four Moves 

First Annual Impact Report Reveals Hackers’ Journeys and How To Mitigate; Demonstrates XM’s Ability to See All Ways that Critical Business Assets Can Be Compromised…

Operationalizing a “think like the enemy” strategy

MITRE ATT&CK and new security technology innovation make this possible.

1 4 5 6 7 8 27

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.