Why and How to Adopt the CTEM Framework
Attack Surfaces are expanding as organizations invest in Cloud, SaaS and third-party supplier relationships to support business needs. At the same time, security teams are realizing they can’t fix...
View ArticleWhat is Active Directory Security?
What Are Active Directory Security Best Practices? Since 1999, Active Directory has been the default identity and access management service in Windows networks. Active Directory is the software...
View ArticleContinuous Exposure Management Across the Attack Surface
The attack surface of organizations keeps expanding to support digitization and business initiatives. As organizations expand their digital presence, forces such as continued cloud adoption, the use...
View ArticleActive Directory Security Checklist
Active Directory is the key to your network, responsible for connecting users with network resources – but it’s also a prime target for attackers. This is why it’s absolutely essential to secure user...
View ArticleAttack Techniques in Okta – Part 2 – Okta RBAC Attacks
Overview Welcome to Part 2 of Okta Attack Techniques. In the previous article, we took a deep dive into the basics of Okta. If learning about attack techniques in Okta interests you, that’s the best...
View ArticleCVE-2024-3094 – Dangerous XZ Utils Backdoor is Discovered
On Friday, March 29th, a Microsoft researcher disclosed that he had found malicious code embedded in XZ Utils versions 5.6.0 and 5.6.1. This vulnerability is being tracked as CVE-2024-3094 and at...
View ArticlePCI-DSS – Out With the Old (v3.2), In With the New (v4.0)
Perhaps PCI-DSS 4.0 launched yesterday, March 31 – a Sunday – to avoid being labeled an April Fool’s Joke to the world? Regardless of why the PCI Security Standards Council (PCI SSC) picked the odd...
View ArticleExtending The 5 Stages of CTEM to the Cloud
If you’re a regular reader of this blog, you’ll know that Continuous Threat Exposure Management (CTEM) is a major driver of everything we do here. The simple reason is that CTEM is the backbone of a...
View ArticleHow Is Your Enterprise IT Hygiene?
We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene and cybersecurity hygiene. But what does this actually mean? Any IT hygiene or cyber hygiene definition...
View ArticleBuyer’s Guide to Meeting and Maintaining CTEM
The movement from fractured Vulnerability Management processes to integrated Exposure Management efforts has helped organizations take greater control of the issues that put them at risk. The post...
View ArticleDemystifying DORA with XM Cyber
In this webinar we will discuss the implications and requirements outlined in the DORA act, with an aim to demystify the finer points of the regulation, while providing real world insights from...
View ArticleAll About Infostealers and How to Block Them
Some things in life are pretty obvious – nights are going to be dark, days are, by nature, bright and infostealers, well, steal information. No surprise there, right? What may be less obvious and may...
View ArticleThe Five Steps of CTEM, Part 3
The Art of Prioritizing Exposures Based on Exploitability and Impact in YOUR Environment Welcome to the third installment of our five-part journey through Continuous Threat Exposure Management (CTEM)....
View ArticleResearch Report: 2024 State of Exposure Management
To help you focus on what matters most, XM Cyber’s third annual research report, Navigating the Paths of Risk: The State of Exposure Management in 2024 is a collaboration between XM Cyber and the...
View ArticleMitigating Risk: How a Retail Chain Built a Compelling Security Investment Case
Summary A North American retail chain with nearly 30k employees, 1k stores, and an extensive network of 3rd party suppliers struggled with expanding their Information Security program beyond a...
View ArticleWhat’s the Source of 80% of Security Exposures? And What’s Causing Only 1%?
New research from XM Cyber offers some eye-opening findings about actual risk versus perceived risk. Cybersecurity is a bit akin to the art of hitting a moving target. Just when you think you’ve got...
View ArticleFC Bayern and XM Cyber – Meeting the Challenges of Digitalization Together
Check out this short video, part 1 of a 5-part series, “Questions for the CIO”, to discover how FC Bayern CIO, Michael Fichtner, tackles the challenges of ensuring optimal fan experiences, meeting EU...
View ArticleAccelerate DORA Readiness with XM Cyber
Financial institutions are at the forefront of technology innovation, delivering secure digital services and establishing trust with customers, stakeholders, and business partners. This need to...
View ArticleThe Ultimate Active Directory Security Checklist for 2024
What is Active Directory and How Does it Work? Active Directory (AD) is like a central nervous system for a Windows network. It’s a giant digital filing cabinet storing information about users,...
View ArticleAdopting DORA with XM Cyber Checklist
Financial institutions must uphold high standards of service, continuity, and resilience to protect data and combat cyber threats, while at the same time delivering innovation in secure digital...
View Article