Attack Path Management

XM Cyber Attack Path Management

  • CVE-2024-6387 – OpenSSH regreSSHion RCE
    by XM Cyber on July 2, 2024 at 7:42 am

    Overview On Monday, July 1st, researchers from OpenSSH released a security update for a newly identified vulnerability which is being tracked as CVE-2024-6387, and… The post CVE-2024-6387 – OpenSSH regreSSHion RCE appeared first on XM Cyber.

  • 11 Best Practices to Ensure Your Kubernetes Clusters are Secure
    by XM Cyber on June 30, 2024 at 8:46 am

    The use of Kubernetes by development teams has exploded over the last few years – but as critical as it is for the management… The post 11 Best Practices to Ensure Your Kubernetes Clusters are Secure appeared first on XM Cyber.

  • Attack Techniques in Okta – Part 3 – From Okta to AWS Environments
    by Keren Farin on June 20, 2024 at 8:57 am

    Welcome to Part 3 of Okta Attack Techniques! In this article, we will cover how an attacker or any malicious actor can abuse three… The post Attack Techniques in Okta – Part 3 – From Okta to AWS Environments appeared first on XM Cyber.

  • SAP Runs Your Business; Make Defending it Part of Your Exposure Management Program
    by XM Cyber on June 13, 2024 at 11:51 am

    Lots of organizations across the globe use SAP to manage business operations and customer relations. Wait, did I say lots? I meant nearly ALL… The post SAP Runs Your Business; Make Defending it Part of Your Exposure Management Program appeared first on XM Cyber.

  • What’s the scoop on cyber threat hunters?
    by XM Cyber on June 13, 2024 at 8:35 am

    XM Cyber announced findings from its third annual State of Exposure Management Report, produced in collaboration with the Cyentia Institute, which found that identity and… The post What’s the scoop on cyber threat hunters? appeared first on XM Cyber.

  • RSA Conference 2024 – Announcements Summary
    by XM Cyber on June 13, 2024 at 8:34 am

    Hundreds of companies are showcasing their products and services this week at the 2024 edition of the RSA Conference in San Francisco. The post RSA Conference 2024 – Announcements Summary appeared first on XM Cyber.

  • Defending Your SAP Castle: Best Practices for Protecting Against Attack Techniques
    by XM Cyber on June 10, 2024 at 12:16 pm

    Join XM Cyber as we introduce our Continuous Exposure Management platform and its SAP attack technique defenses as part of an enterprise-wide Exposure Management… The post Defending Your SAP Castle: Best Practices for Protecting Against Attack Techniques appeared first on XM Cyber.

  • XM Cyber Launches SAP Exposure Management to Defend Business Critical Applications
    by XM Cyber on June 10, 2024 at 12:00 pm

    New SAP Exposure Management capability will provide continuous visibility and remediation, helping organizations defend their business-critical applications. Tel Aviv, Israel, June 10, 2024 –… The post XM Cyber Launches SAP Exposure Management to Defend Business Critical Applications appeared first on XM Cyber.

  • Solution Brief- XM Cyber for SAP
    by XM Cyber on June 9, 2024 at 8:00 am

    Identify and Remediate Exposures that Enable SAP Specific Attacks Empowering organizations to proactively defend against SAP-specific attacks, XM Cyber’s exposure management solution provides continuous… The post Solution Brief- XM Cyber for SAP appeared first on XM Cyber.

  • How Do You Validate Security/Risk?
    by XM Cyber on June 4, 2024 at 11:06 am

    The Five Steps of CTEM, Part 4 Welcome to the fourth installment of our five-part journey through Continuous Threat Exposure Management (CTEM). In 2022,… The post How Do You Validate Security/Risk? appeared first on XM Cyber.

Share Websitecyber