Quantcast
Browsing all 94 articles
Browse latest View live

5 CTEM Myths – Debunked!

As we’ve discussed extensively in past blogs, the Continuous Threat Exposure Management framework (CTEM) is an increasingly popular proactive cybersecurity approach. CTEM’s power lies in its construct,...

View Article


The NIST Cybersecurity Framework (CSF) Checklist

Organizations are constantly seeking innovative solutions to strengthen defenses and achieve greater resilience against cyber threats. While there are many ways to achieve this, The National Institute...

View Article


A Practical Checklist to CTEM

Use this practical checklist to keep yourself and your team on track to continue to meet the stages of CTEM. The post A Practical Checklist to CTEM appeared first on XM Cyber.

View Article

CTEM: Cybersecurity’s Peanut Butter Problem Solver (And Why I’m Excited About...

Stop me if you’ve heard this before: You invest heavily in cybersecurity, you patch your systems regularly. And yet, you worry about unseen threats lurking in your network. And yet, you still feel that...

View Article

Vulnerability Management Vs Exposure Management: The Complete Comparison

Let’s talk for a moment about cats and dogs. Both furry friends fall under the category of “pet” and help us humans reduce stress levels and live longer, healthier lives. But anyone who’s owned one...

View Article


9 Reasons CTEM Needs to be in Your 2025 Budget

With the summer over and Q3 in full swing, that can only mean one thing – it’s time to get 2025 budgets in order. And across many areas of business, getting budgets for projects or initiatives isn’t as...

View Article

How to Make Sure the Board is On-Board (and Not Bored) with Cybersecurity

The relationship between CISOs and the Board of Directors is not always smooth sailing. More often than not, it’s marred by a significant communication gap. The fact is that Board members often...

View Article

Just in Time for International Podcast Day: 20 Can’t-Miss Cybersecurity Podcasts

In honor of International Podcast Day today, we’re pleased to offer you the best of the best of what have become invaluable tools for so many cybersecurity professionals: cybersecurity podcasts.    The...

View Article


Image may be NSFW.
Clik here to view.

Linux CUPS Vulnerability: 4 Critical Flaws Enable RCEs

On Sept 26th, security researcher Simone Margeritelli (@evilsocket) disclosed the discovery of 4 zero-day vulnerabilities in the Common UNIX Printing System (CUPS). CUPS is a popular open-source...

View Article


Gartner Implement a Continuous Threat Exposure Management (CTEM) Program

As organizations begin to plan their budgets for 2025, it’s essential to prioritize investments in security. Gartner® states  that “by 2026, organizations prioritizing their security investments based...

View Article

How Digital Twins are Revolutionizing Threat Management

The concept of the digital twin has been around a lot longer than you might think.  Initially developed by NASA, the origins of the digital twin lie in the issues they faced during the Apollo missions...

View Article

How to Operationalize Exposure Management with ServiceNow and XM Cyber

Security and IT teams need more than automation—they need the right insights to prioritize the threats that pose the greatest risk. Join us in our upcoming webinar, How to Operationalize Exposure...

View Article

Building the Foundation for Effective Security and IT Operations – XM Cyber...

  XM Cyber and ServiceNow are coming together to integrate the leading continuous exposure management platform with the leading workflow automation platform. We’re excited about this collaboration that...

View Article


How to Adopt a Threat-Led Approach to Vulnerability Management

In today’s complex threat landscape, it’s not just about finding vulnerabilities – it’s about understanding their real-world business impact. Join us for our upcoming webinar, How to Adopt a Threat-Led...

View Article

How to Secure CFO Buy-In for CTEM Projects: 9 Tips

If you remember my last blog here, we covered the 9 reasons that Continuous Threat Exposure Management CTEM needs to be on your 2025 budget.  Now that you know the WHY part of the equation, let’s focus...

View Article


5 Steps to Adopting a Threat-Led Approach to Vulnerability Management

Organizations are constantly challenged with managing vulnerabilities effectively to safeguard their critical assets and data. And often, traditional approaches, relying on periodic scans and...

View Article

The First 90 Days as CISO – Your Roadmap to Success

They say you never get a second chance to make a first impression. And accordingly, your first 90 days in a new role often serve as an indicator of your full experience. The post The First 90 Days as...

View Article


How to Grow Vulnerability Management Into Exposure Management

As 2025 approaches, are you still thinking about Vulnerability Management? With evolving threat avenues and attack surfaces, vulnerability assessments yield an ever-growing laundry list of things to...

View Article

The 3 Key Ingredients to Getting CTEM Right

As a CISO with over 25 years of experience across diverse industries, I’ve seen the limitations of traditional vulnerability management firsthand. It’s often a compliance-driven, check-the-box exercise...

View Article

Your Guide to Exposure Management: Why You Need it and How to do it

Exposure Management is a proactive approach to cybersecurity that involves identifying, assessing, and mitigating potential vulnerabilities. By understanding and reducing an organization’s attack...

View Article
Browsing all 94 articles
Browse latest View live