XM Cyber Attack Path Management
- Shadow IT is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activityby julia on August 20, 2025 at 11:28 am
Shadow AI is no longer a fringe phenomenon. A Microsoft survey found that 78% of AI users bring their own tools to the workplace,… The post Shadow IT is Everywhere: XM Cyber Finds 80% of Companies Show Signs of Unapproved AI Activity appeared first on XM Cyber.
- XM Cyber and Google SecOps: Turning Context into Actionby julia on August 18, 2025 at 10:06 am
Security teams are bombarded with alerts from SIEM, SOAR, EDR, and the rest of their security war chest. Each alert demands attention, yet itâs… The post XM Cyber and Google SecOps: Turning Context into Action appeared first on XM Cyber.
- XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights⢠Voice of the Customer for Vulnerability Assessmentby XM Cyber on August 7, 2025 at 9:11 am
Weâre thrilled to share that XM Cyber is recognized in the Gartner Peer Insights⢠Voice of the Customer for Vulnerability Assessment. This isnât something… The post XM Cyber is Recognized as a Strong Performer in the 2025 Gartner Peer Insights⢠Voice of the Customer for Vulnerability Assessment appeared first on XM Cyber.
- XM Cyber Delivers Threat Exposure Insights and Context with Google Cloudby XM Cyber on August 5, 2025 at 12:22 pm
Tel Aviv, August 5th: XM Cyber is excited to announce a collaboration dedicated to pairing XM Cyberâs expertise in continuous exposure management and Google… The post XM Cyber Delivers Threat Exposure Insights and Context with Google Cloud appeared first on XM Cyber.
- XM Cyber For Exposed Credentials Managementby XM Cyber on July 30, 2025 at 8:04 am
Protect Your Business from Stolen Credentials Before They are Exploited Leverage near real-time alerts of external breaches that compromise your employeesâ credentials and digital… The post XM Cyber For Exposed Credentials Management appeared first on XM Cyber.
- Five exposure gaps that can get past PAMsby Keren Farin on July 27, 2025 at 10:53 am
Traditional privileged access management (PAM) tools have long played a critical role in identity security. However, they often lack a threat-led approach that connects… The post Five exposure gaps that can get past PAMs appeared first on XM Cyber.
- One Year Later: The Tangible ROI of Exposure Management After Year Oneby XM Cyber on July 27, 2025 at 8:12 am
In theory, Exposure Management offers teams a direct, structured way to reduce complexity and regain control. Itâs supposed to sharpen focus, accelerate response times,… The post One Year Later: The Tangible ROI of Exposure Management After Year One appeared first on XM Cyber.
- Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability âToolShellâ Under Active Attackby XM Cyber on July 21, 2025 at 8:07 am
Overview Microsoft has just disclosed that a vulnerability in their Microsoft SharePoint Server has been weaponized and is currently being actively exploited in the… The post Urgent Alert: Microsoft SharePoint Zero-Day Vulnerability âToolShellâ Under Active Attack appeared first on XM Cyber.
- XM Cyber & IQUW: Focusing Effort Where it Matters Mostby Keren Farin on July 8, 2025 at 8:07 am
As Group CISO of luxury re-insurer IQUW, industry veteran Stephen Owens knows itâs impossible to fix all issues that could put a business at… The post XM Cyber & IQUW: Focusing Effort Where it Matters Most appeared first on XM Cyber.
- The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitionsby XM Cyber on July 7, 2025 at 12:36 pm
When it comes to mergers and acquisitions, every scenario is different â some are relatively straightforward, while others are complex and years in the… The post The M&A Security Playbook: 11 Questions to Master Cybersecurity in Mergers and Acquisitions appeared first on XM Cyber.