5 CTEM Myths – Debunked!
As we’ve discussed extensively in past blogs, the Continuous Threat Exposure Management framework (CTEM) is an increasingly popular proactive cybersecurity approach. CTEM’s power lies in its construct,...
View ArticleThe NIST Cybersecurity Framework (CSF) Checklist
Organizations are constantly seeking innovative solutions to strengthen defenses and achieve greater resilience against cyber threats. While there are many ways to achieve this, The National Institute...
View ArticleA Practical Checklist to CTEM
Use this practical checklist to keep yourself and your team on track to continue to meet the stages of CTEM. The post A Practical Checklist to CTEM appeared first on XM Cyber.
View ArticleCTEM: Cybersecurity’s Peanut Butter Problem Solver (And Why I’m Excited About...
Stop me if you’ve heard this before: You invest heavily in cybersecurity, you patch your systems regularly. And yet, you worry about unseen threats lurking in your network. And yet, you still feel that...
View ArticleVulnerability Management Vs Exposure Management: The Complete Comparison
Let’s talk for a moment about cats and dogs. Both furry friends fall under the category of “pet” and help us humans reduce stress levels and live longer, healthier lives. But anyone who’s owned one...
View Article9 Reasons CTEM Needs to be in Your 2025 Budget
With the summer over and Q3 in full swing, that can only mean one thing – it’s time to get 2025 budgets in order. And across many areas of business, getting budgets for projects or initiatives isn’t as...
View ArticleHow to Make Sure the Board is On-Board (and Not Bored) with Cybersecurity
The relationship between CISOs and the Board of Directors is not always smooth sailing. More often than not, it’s marred by a significant communication gap. The fact is that Board members often...
View ArticleJust in Time for International Podcast Day: 20 Can’t-Miss Cybersecurity Podcasts
In honor of International Podcast Day today, we’re pleased to offer you the best of the best of what have become invaluable tools for so many cybersecurity professionals: cybersecurity podcasts. The...
View ArticleLinux CUPS Vulnerability: 4 Critical Flaws Enable RCEs
On Sept 26th, security researcher Simone Margeritelli (@evilsocket) disclosed the discovery of 4 zero-day vulnerabilities in the Common UNIX Printing System (CUPS). CUPS is a popular open-source...
View ArticleGartner Implement a Continuous Threat Exposure Management (CTEM) Program
As organizations begin to plan their budgets for 2025, it’s essential to prioritize investments in security. Gartner® states that “by 2026, organizations prioritizing their security investments based...
View ArticleHow Digital Twins are Revolutionizing Threat Management
The concept of the digital twin has been around a lot longer than you might think. Initially developed by NASA, the origins of the digital twin lie in the issues they faced during the Apollo missions...
View ArticleHow to Operationalize Exposure Management with ServiceNow and XM Cyber
Security and IT teams need more than automation—they need the right insights to prioritize the threats that pose the greatest risk. Join us in our upcoming webinar, How to Operationalize Exposure...
View ArticleBuilding the Foundation for Effective Security and IT Operations – XM Cyber...
XM Cyber and ServiceNow are coming together to integrate the leading continuous exposure management platform with the leading workflow automation platform. We’re excited about this collaboration that...
View ArticleHow to Adopt a Threat-Led Approach to Vulnerability Management
In today’s complex threat landscape, it’s not just about finding vulnerabilities – it’s about understanding their real-world business impact. Join us for our upcoming webinar, How to Adopt a Threat-Led...
View ArticleHow to Secure CFO Buy-In for CTEM Projects: 9 Tips
If you remember my last blog here, we covered the 9 reasons that Continuous Threat Exposure Management CTEM needs to be on your 2025 budget. Now that you know the WHY part of the equation, let’s focus...
View Article5 Steps to Adopting a Threat-Led Approach to Vulnerability Management
Organizations are constantly challenged with managing vulnerabilities effectively to safeguard their critical assets and data. And often, traditional approaches, relying on periodic scans and...
View ArticleThe First 90 Days as CISO – Your Roadmap to Success
They say you never get a second chance to make a first impression. And accordingly, your first 90 days in a new role often serve as an indicator of your full experience. The post The First 90 Days as...
View ArticleHow to Grow Vulnerability Management Into Exposure Management
As 2025 approaches, are you still thinking about Vulnerability Management? With evolving threat avenues and attack surfaces, vulnerability assessments yield an ever-growing laundry list of things to...
View ArticleThe 3 Key Ingredients to Getting CTEM Right
As a CISO with over 25 years of experience across diverse industries, I’ve seen the limitations of traditional vulnerability management firsthand. It’s often a compliance-driven, check-the-box exercise...
View ArticleYour Guide to Exposure Management: Why You Need it and How to do it
Exposure Management is a proactive approach to cybersecurity that involves identifying, assessing, and mitigating potential vulnerabilities. By understanding and reducing an organization’s attack...
View Article