Resources

Topics

How Is Your Enterprise IT Hygiene?
Artiom Levinton | Blog

We’re hearing a lot these days about the need for strong and consistent enterprise IT hygiene in cybersecurity. Good. What is that, anyway? An…

Best Practices for Cloud Security Posture Management
Blog

Cloud services are booming and adoption continues unabated. That’s a good thing, given that the efficiencies that are attached to cloud computing can unlock…

A Look Ahead to 2021 With XM Cyber — How To Shield Your Organization’s Security Posture
Blog

The “New Year’s blog” is an established — if not exactly cherished — tradition in business communication. It’s an opportunity to reflect on the…

Chile: XM Cyber enseña cómo proteger la ciberseguridad de organizaciones por medio del Equipo Púrpura
Blog

Júntese a XM Cyber en nuestra presentación sobre la simulación de brechas y ataques (beach and attack simulation) para el mercado chileno de ciberseguridad,…

Digital Transformation: Enabling Your Defenders to See Like Their Attackers
Blog

Digital transformation is a phrase that gets bandied about often enough to almost qualify for the “buzzword” category. Yet scratch below the surface and…

Create a Resilient Security Posture that Takes the Initiative from Cyber Attackers
Blog

Cybersecurity professionals have never had it easy — but these days the game is definitely being played on expert mode. Threats aren’t only increasing…

4 Smart Steps for Improving Your Organization’s Cybersecurity Posture
Blog

Cybersecurity has never been an easy game to play, but the difficulty curve has certainly risen sharply in recent years. Adversaries with limited resources…

Five Best Practices for Proactive Security Posture Management
Blog

When it comes to having an effective security posture, it often boils down to three words: Reactive or proactive? Let’s take a closer look…

Don’t Let Hackers Fool Your Organization’s Cybersecurity on April Fool’s Day
Blog

Almost all of us have been the victim of a friendly April Fool’s joke. You know the setup: We’re led to believe an outrageous…

Coronavirus and Cyber Attacks Share a Common Weakness: Good Hygiene
Blog

The coronavirus – also known as COVID-19 – has been inescapable lately. What you may not know, however, is that global human health pandemics…

See all ways we can help you

See what attackers see, so you can stop them from doing what attackers do.