Resources

What is Cybersecurity Performance Management?

The process of cybersecurity performance management helps an organization understand how well it is meeting its cybersecurity objectives. Because conventional performance management metrics (such…

What is Cloud Security Compliance?

Cloud migration and the popularity of AWS, Azure and other Infrastructure-as-a-Service providers have created myriad new data security challenges for today’s businesses. Cloud security…

Our security is only as strong as our ability to manage it: The necessity of Attack Path Management for the Hybrid Cloud
Michael Greenberg | May 12, 2022

Now it’s no secret businesses have ramped up and driven the adoption of the cloud faster than any period previously. One of the key…

What is Threat Simulation?

Often the best way to defend against a threat is to assume the perspective of an attacker. By modeling how a cyber-adversary is likely…

The XM Cyber 2022 Attack Path Management Impact Report
Michael Greenberg | April 26, 2022

The industry’s first annual attack path management research report is here! The XM Cyber research team analyzed nearly 2 million entities to bring insights…

5 Ways to Make Attack Path Management More Manageable
Shay Siksik | April 20, 2022

Effective cybersecurity can be distilled to a single idea: Protect your most business critical assets. Protecting your most critical assets, in turn, can be…

XM Cyber Advisory – Spring4Shell, Zero Day
Zur Ulianitzky; Ilay Grossman | March 31, 2022

Overview On March 30, A new zero day critical vulnerability was leaked in another open source software library. The vulnerability affects Spring Framework which…

2022 Attack Path Management Impact Report

The XM Cyber 2022 Attack Path Management Impact Report is the industry’s first annual report that reveals the likelihood and impact of a breach,…

New Privilege Escalation Techniques are Compromising your Google Cloud Platform
Idan Strovinsky, Zur Ulianitzky | March 27, 2022

In this research you’ll discover some of the common attack techniques used in Google Cloud Platform (GCP) to better understand how an attacker exploits…

Introduction: See All Ways

Despite all the resources companies devote to cybersecurity most can’t answer the simple question: “Is our business secure?”. To overcome this big disconnect, organizations…

Video: Plymouth Rock achieves vulnerability prioritization with XM Cyber to focus on the right remediation

Plymouth Rock has a committed team working hard to ensure the company’s critical assets remain secure. To accomplish this, the team utilizes tools from…

See All Ways: How to Overcome the Big Disconnect in Cybersecurity
Sharron Malaver | March 14, 2022

Today’s reality in cybersecurity is that, with the right combination of tools, you may be able to see all kinds of misconfigurations … and…

1 10 11 12 13 14 33

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.