Quantcast
Browsing all 94 articles
Browse latest View live

Why and How to Adopt the CTEM Framework

Attack Surfaces are expanding as organizations invest in Cloud, SaaS and third-party supplier relationships to support business needs. At the same time, security teams are realizing they can’t fix...

View Article


Image may be NSFW.
Clik here to view.

What is Active Directory Security?

What Are Active Directory Security Best Practices? Since 1999, Active Directory has been the default identity and access management service in Windows networks. Active Directory is the software...

View Article


Image may be NSFW.
Clik here to view.

Continuous Exposure Management Across the Attack Surface

The attack surface of organizations keeps expanding to support digitization and business initiatives. As organizations expand their digital presence, forces such as continued cloud adoption, the use...

View Article

Active Directory Security Checklist

Active Directory is the key to your network, responsible for connecting users with network resources – but it’s also a prime target for attackers. This is why it’s absolutely essential to secure user...

View Article

Image may be NSFW.
Clik here to view.

Attack Techniques in Okta – Part 2 – Okta RBAC Attacks

Overview Welcome to Part 2 of Okta Attack Techniques.  In the previous article, we took a deep dive into the basics of Okta. If learning about attack techniques in Okta interests you, that’s the best...

View Article


Image may be NSFW.
Clik here to view.

CVE-2024-3094 – Dangerous XZ Utils Backdoor is Discovered

On Friday, March 29th, a Microsoft researcher disclosed that he had found malicious code embedded in XZ Utils versions 5.6.0 and 5.6.1. This vulnerability is being tracked as CVE-2024-3094 and at...

View Article

PCI-DSS – Out With the Old (v3.2), In With the New (v4.0)

Perhaps PCI-DSS 4.0 launched yesterday, March 31 – a Sunday – to avoid being labeled an April Fool’s Joke to the world? Regardless of why the PCI Security Standards Council (PCI SSC) picked the odd...

View Article

Extending The 5 Stages of CTEM to the Cloud

If you’re a regular reader of this blog, you’ll know that Continuous Threat Exposure Management (CTEM) is a major driver of everything we do here. The simple reason is that CTEM is the backbone of a...

View Article


How Is Your Enterprise IT Hygiene?

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene and cybersecurity hygiene. But what does this actually mean?  Any IT hygiene or cyber hygiene definition...

View Article


Buyer’s Guide to Meeting and Maintaining CTEM

The movement from fractured Vulnerability Management processes to integrated Exposure Management efforts has helped organizations take greater control of the issues that put them at risk. The post...

View Article

 Demystifying DORA with XM Cyber

In this webinar we will discuss the implications and requirements outlined in the DORA act, with an aim to demystify the finer points of the regulation, while providing real world insights from...

View Article

Image may be NSFW.
Clik here to view.

All About Infostealers and How to Block Them

Some things in life are pretty obvious – nights are going to be dark, days are, by nature, bright and infostealers, well, steal information. No surprise there, right?  What may be less obvious and may...

View Article

The Five Steps of CTEM, Part 3

The Art of Prioritizing Exposures Based on Exploitability and Impact in YOUR Environment Welcome to the third installment of our five-part journey through Continuous Threat Exposure Management (CTEM)....

View Article


Research Report: 2024 State of Exposure Management

To help you focus on what matters most, XM Cyber’s third annual research report, Navigating the Paths of Risk: The State of Exposure Management in 2024 is a collaboration between XM Cyber and the...

View Article

Image may be NSFW.
Clik here to view.

Mitigating Risk: How a Retail Chain Built a Compelling Security Investment Case

Summary A North American retail chain with nearly 30k employees, 1k stores, and an extensive network of 3rd party suppliers struggled with expanding their Information Security program beyond a...

View Article


Image may be NSFW.
Clik here to view.

What’s the Source of 80% of Security Exposures? And What’s Causing Only 1%?

New research from XM Cyber offers some eye-opening findings about actual risk versus perceived risk. Cybersecurity is a bit akin to the art of hitting a moving target. Just when you think you’ve got...

View Article

FC Bayern and XM Cyber – Meeting the Challenges of Digitalization Together

Check out this short video, part 1 of a 5-part series, “Questions for the CIO”, to discover how FC Bayern CIO, Michael Fichtner, tackles the challenges of ensuring optimal fan experiences, meeting EU...

View Article


Accelerate DORA Readiness with XM Cyber

Financial institutions are at the forefront of technology innovation, delivering secure digital services and establishing trust with customers, stakeholders, and business partners. This need to...

View Article

The Ultimate Active Directory Security Checklist for 2024

What is Active Directory and How Does it Work? Active Directory (AD) is like a central nervous system for a Windows network. It’s a giant digital filing cabinet storing information about users,...

View Article

Adopting DORA with XM Cyber Checklist

Financial institutions must uphold high standards of service, continuity, and resilience to protect data and combat cyber threats, while at the same time delivering innovation in secure digital...

View Article
Browsing all 94 articles
Browse latest View live