Resources

Cloud Security Masterclass Part 1: Lifting the Fog: Understanding how to Secure the Hybrid Cloud

With heavy pressures to accelerate digital transformation due to the COVID-19 pandemic, adopting and securing cloud environments is more urgent than ever. A question…

Ransomware from the attacker’s perspective

Ransomware is the number 1 cyber-crime threat today and during this webinar, our guest speakers shared their perspectives and experiences in terms of how…

Offensive Insight for Cloud Security
Menachem Shafran |

Exploration of the recent vulnerabilities, threats and possible exploits in cloud environment and the modern hacker’s perspective. Review the gaps in the traditional security…

David Petraeus and Tamir Pardo meet at Cybertech Global 2021

XM Cyber’s President & Co-Founder Tamir Pardo met former CIA Director David Petraeus. The topic? The changes and turmoil 2020 brought to the cyber…

Automated BAS – The Cost and Risk Reduction Revolution Is Here
Menachem Shafran |

Hear from Jarad Carleton, Global Program Leader of Cybersecurity at Frost & Sullivan as he does a 25 minute deep dive into BAS.

Case Study: Plymouth Rock

When a leading US insurance firm needed help managing cybersecurity risk, XM Cyber had them covered “Understanding different attack types and how they move…

What is an Attack Surface?

An attack surface can be defined as anywhere and everywhere an organization is vulnerable to cyber-attacks. This includes all possible attack vectors where an…

What is Risk-Based Vulnerability Management?

Risk-based Vulnerability Management (RBVM) is a cybersecurity strategy designed to help organizations limit risk through the strategic prioritization of vulnerability remediation. To accomplish this,…

What is Common Vulnerability Scoring System?

The Common Vulnerability Scoring System (CVSS) is an open framework used by organizations across the world to determine the severity of cybersecurity vulnerabilities. These…

What is Cybersecurity Posture?

Cybersecurity threats and organizational challenges related to information security are becoming more complex by the minute. To understand these elements at a high level…

What is Cyber Risk Score?

Having a strong security posture is a core objective for modern organizations. Yet measuring the strength of these postures is often challenging, given their…

What is Hybrid Cloud Security?

Hybrid cloud security aims to protect applications, data, infrastructure and other elements across an IT infrastructure that includes multiple environments, including at least one…

1 12 13 14 15 16 33

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.