Quantcast
Channel: Resources | XM Cyber
Browsing latest articles
Browse All 99 View Live

CVE-2025-24813: Critical Apache Tomcat Vulnerability Already Being Exploited...

Overview  Apache Tomcat, the free and open-source implementation of the Java Servlet, recently disclosed a critical vulnerability which is being tracked as CVE-2025-24813. This new path equivalence...

View Article


Gartner® Market Guide for Adversarial Exposure Validation

Discover how AEV helps you stay ahead of threats and enhances security posture The post Gartner® Market Guide for Adversarial Exposure Validation appeared first on XM Cyber.

View Article


Image may be NSFW.
Clik here to view.

Seeing What Attackers See: How Attack Graphs Help You Stay Ahead of Cyber...

Cybersecurity can seem like  a game of cat and mouse.  Defenders try to anticipate attackers’ moves; attackers try to sneak through gaps in security coverage. Organizations most frequently fall victim...

View Article

Ten Things You Need to Do Yesterday to Stay Compliant with NIS2

When it comes to the EU’s NIS2 Directive, meeting the basic requirements (according to the legislation in your company’s location) is only the first step. Like most regulatory frameworks, NIS2 is not...

View Article

Cloud Transformation webinar – Don’t Get Caught CNAPPing!

Join our cloud security experts as we tackle these challenges head-on and uncover what true cloud transformation really looks like. The post Cloud Transformation webinar – Don’t Get Caught CNAPPing!...

View Article


Image may be NSFW.
Clik here to view.

XM Cyber for Healthcare- Your Proactive Cybersecurity Care Plan to Cure...

Patient Care and Cybersecurity for Hybrid Environments Patient care creates sensitive data, including Personally Identifiable Information (PII), Payment Card Industry (PCI), and Protected Health...

View Article

Continuous Exposure Management Platform

Focus on fixing your most critical exposures. With XM Cyber, you can identify all vulnerabilities, misconfigurations, and credential issues to see how they chain… The post Continuous Exposure...

View Article

Image may be NSFW.
Clik here to view.

XM Cyber External Attack Surface Management

As organizations expand their digital presence, forces such as continued cloud adoption, the use of SaaS platforms, and ever increasing reliance on third-party vendors create an attack surface full of...

View Article


Image may be NSFW.
Clik here to view.

XM Cyber for Retail and Hospitality- Proactively Secure Customer Data and...

Reducing the Risk to Retail Operations Business Processes from On-Prem to Cloud Retailers and hospitality businesses are prime targets for cyber threats that exploit exposures in Point-of-Sale (PoS)...

View Article


From Blocker to Enabler: Translating Cyber Risk into Business Value

When it comes to justifying security investments to the CFO, technical arguments aren’t enough. Any CFO worth their paycheck will prioritize financial impact, operational efficiency, and risk...

View Article
Browsing latest articles
Browse All 99 View Live