Resources

Topics

What Is the Difference Between Vulnerability Assessment and Vulnerability Management?
Dan Anconina | Blog

If you have an extremely valuable asset, you need a smart strategy to protect it. Unfortunately, many organizations are operating without one. That lack…

What Are the Different Types of Vulnerability Assessment?
Dan Anconina | Blog

How do we best protect what’s most valuable to us? That’s a question that we all wrestle with. For today’s enterprises, few things are…

Getting Started with the Risk-based Vulnerability Management Approach
Blog

Managing cybersecurity vulnerabilities is enough to make anyone feel under siege. In recent years there have been anywhere from 30-40 new vulnerabilities released daily,…

What You Need to Know About Prioritizing Vulnerabilities
Blog

Sisyphus, a famous king from Greek mythology, was known for being crafty. He cleverly used deceit and trickery to twice cheat death. Zeus and…

Why XM Cyber Is Integrating with Tenable.io
Blog

By providing critical attack-centric context, XM Cyber helps extend the power of Tenable’s cyber exposure platform Like peanut butter and jelly, some things are…

XM Cyber Reveals First-Ever Integrated Vulnerability and Attack Path Management Solutions  
Blog

“Am I doing enough to keep my organization safe from a data breach?” is the question that keeps most CISOs awake at night. While…

Is Prioritization Important in Risk-Based Vulnerability Management?
Blog

Vulnerability may be an endearing trait among people, but it should be anathema to any smart organization. Look no further than the endless parade…

Why Continuous Attack-Based Vulnerability Management Is the Smartest Way to Identify and Remediate Risks to Your Digital World
Blog

Complex, constantly changing digital networks represent an ongoing risk to most organizations. Information technology and cybersecurity teams are overwhelmed with alerts, software updates, and…

México: XM Cyber enseña cómo pensar como un hacker para protegerse de ciberataques
Blog

Júntese a XM Cyber en nuestra presentación sobre la simulación de brechas y ataques (beach and attack simulation) para el mercado mexicano de ciberseguridad,…

Top Tips for Conducting an Enterprise Vulnerability Assessment
Blog

If you’re reading this, you’re probably aware of the general idea behind a vulnerability assessment. In the plainest terms, it’s a process undertaken with…

Key Tips for Extracting Maximum Value From Your Vulnerability Management Solution
Blog

If it seems like the task of vulnerability risk management is growing more difficult by the day, there’s a good reason for that impression….

Find and fix the exposures that put your critical assets at risk with ultra-efficient remediation.

See what attackers see, so you can stop them from doing what attackers do.