info.xmcyber.com
Open in
urlscan Pro
2606:2c40::c73c:671c
Public Scan
Submitted URL: https://info.xmcyber.com/e3t/Ctc/5B+113/cvpnm04/VVyXzZ3kMdYnW7DxQfg7W38rxW3rtmkr53qY06N56dXjv3prCCW95jsWP6lZ3lnW4_DCvb5TX...
Effective URL: https://info.xmcyber.com/the-power-of-attack-graphs-in-cloud?utm_campaign=The%20Power%20Of%20Attack%20Graphs%20in%20the%2...
Submission: On September 15 via manual from SG — Scanned from SG
Effective URL: https://info.xmcyber.com/the-power-of-attack-graphs-in-cloud?utm_campaign=The%20Power%20Of%20Attack%20Graphs%20in%20the%2...
Submission: On September 15 via manual from SG — Scanned from SG
Form analysis
1 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4156399/26ef84e2-ac04-4f4c-a3c6-a2990c9580a6
<form id="hsForm_26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4156399/26ef84e2-ac04-4f4c-a3c6-a2990c9580a6"
class="hs-form-private hsForm_26ef84e2-ac04-4f4c-a3c6-a2990c9580a6 hs-form-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6 hs-form-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_d7ac7f6c-19ae-42d6-bb6e-e9aebfb6a369 hs-form stacked hs-custom-form"
target="target_iframe_26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" data-instance-id="d7ac7f6c-19ae-42d6-bb6e-e9aebfb6a369" data-form-id="26ef84e2-ac04-4f4c-a3c6-a2990c9580a6" data-portal-id="4156399">
<fieldset class="form-columns-2">
<div class="hs_firstname hs-firstname hs-fieldtype-text field hs-form-field"><label id="label-firstname-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your "
for="firstname-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="firstname-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" name="firstname" required="" placeholder="First name*" type="text" class="hs-input" inputmode="text" autocomplete="given-name" value=""></div>
</div>
<div class="hs_lastname hs-lastname hs-fieldtype-text field hs-form-field"><label id="label-lastname-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your "
for="lastname-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="lastname-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" name="lastname" required="" placeholder="Last name*" type="text" class="hs-input" inputmode="text" autocomplete="family-name" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your " for="email-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" name="email" required="" placeholder="Business email*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_phone hs-phone hs-fieldtype-phonenumber field hs-form-field"><label id="label-phone-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your "
for="phone-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="phone-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" name="phone" required="" placeholder="Phone number*" type="tel" class="hs-input" inputmode="tel" autocomplete="tel" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_video_name hs-video_name hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-video_name-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your "
for="video_name-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="video_name" class="hs-input" type="hidden" value="Go beyond Log4Shell and see the entire attack path with XM Cyber"></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_jobtitle hs-jobtitle hs-fieldtype-text field hs-form-field"><label id="label-jobtitle-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your "
for="jobtitle-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span></span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="jobtitle-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" name="jobtitle" required="" placeholder="Job title*" type="text" class="hs-input" inputmode="text" autocomplete="organization-title" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_demo_request hs-demo_request hs-fieldtype-select field hs-form-field"><label id="label-demo_request-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your Would you like a demo of XM Cyber?"
for="demo_request-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span>Would you like a demo of XM Cyber?</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><select id="demo_request-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="hs-input is-placeholder" name="demo_request">
<option disabled="" value="">Please Select</option>
<option value="Yes">Yes</option>
<option value="Not right now">Not right now</option>
</select></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_utm_term hs-utm_term hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_term-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your UTM Term"
for="utm_term-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span>UTM Term</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_term" class="hs-input" type="hidden" value=""></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_utm_campaign hs-utm_campaign hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_campaign-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your UTM Campaign"
for="utm_campaign-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span>UTM Campaign</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_campaign" class="hs-input" type="hidden" value="The Power Of Attack Graphs in the Cloud"></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_utm_medium hs-utm_medium hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_medium-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your UTM Medium"
for="utm_medium-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span>UTM Medium</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_medium" class="hs-input" type="hidden" value="email"></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_utm_content hs-utm_content hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_content-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your UTM Content"
for="utm_content-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span>UTM Content</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_content" class="hs-input" type="hidden" value="274238204"></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="hs_utm_source hs-utm_source hs-fieldtype-text field hs-form-field" style="display: none;"><label id="label-utm_source-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="" placeholder="Enter your UTM Source"
for="utm_source-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935"><span>UTM Source</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="utm_source" class="hs-input" type="hidden" value="hs_email"></div>
</div>
</fieldset>
<fieldset class="form-columns-1">
<div class="legal-consent-container">
<div>
<div class="hs-dependent-field">
<div class="hs_LEGAL_CONSENT.subscription_type_4619099 hs-LEGAL_CONSENT.subscription_type_4619099 hs-fieldtype-booleancheckbox field hs-form-field">
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input">
<ul class="inputs-list" required="">
<li class="hs-form-booleancheckbox"><label for="LEGAL_CONSENT.subscription_type_4619099-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="hs-form-booleancheckbox-display"><input
id="LEGAL_CONSENT.subscription_type_4619099-26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" class="hs-input" type="checkbox" name="LEGAL_CONSENT.subscription_type_4619099" value="true"><span>
<p>By signing up you are agreeing to receive occasional marketing, product and event updates from XM Cyber. You can unsubscribe at any time.</p>
<p> </p>
<p><br>By submitting the form, I acknowledge that I have read the <a href="https://www.xmcyber.com/privacy-policy/" rel="noopener">Privacy Policy</a>.</p><span class="hs-form-required">*</span>
</span></label></li>
</ul>
</div>
</div>
</div>
<legend class="hs-field-desc checkbox-desc" style="display: none;"></legend>
</div>
</div>
</fieldset>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Submit"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1694763716738","formDefinitionUpdatedAt":"1694679110089","legalConsentOptions":"{\"communicationConsentCheckboxes\":[{\"communicationTypeId\":4619099,\"label\":\"<p>By signing up you are agreeing to receive occasional marketing, product and event updates from XM Cyber. You can unsubscribe at any time.</p>\\n<p>&nbsp;</p>\\n<p><br>By submitting the form, I acknowledge that I have read the <a href=\\\"https://www.xmcyber.com/privacy-policy/\\\" rel=\\\"noopener\\\">Privacy Policy</a>.</p>\",\"required\":true}],\"legitimateInterestLegalBasis\":\"LEGITIMATE_INTEREST_PQL\",\"processingConsentType\":\"IMPLICIT\",\"processingConsentCheckboxLabel\":\"<p>By submitting the form, I acknowledge that I have read the <a href=\\\"https://www.xmcyber.com/privacy-policy/\\\" target=\\\"_blank\\\">Privacy Policy</a>.</p>\",\"isLegitimateInterest\":false}","clonedFromForm":"528c683b-b2ad-4c81-948d-770dac7efb70","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.62 Safari/537.36","pageTitle":"The Power of Attack Graphs in Cloud","pageUrl":"https://info.xmcyber.com/the-power-of-attack-graphs-in-cloud?utm_campaign=The%20Power%20Of%20Attack%20Graphs%20in%20the%20Cloud&utm_medium=email&_hsmi=274238266&_hsenc=p2ANqtz-8dJm9gUK8gaQLhIyRemjpUCeewDwHi6JsQPVMVMqp72dBMPjfohYRUL_yGQDx5ZFwNvaxAsE3GeIs-pAGMa5bz6bIl74etKVNz4skDGDJ44N5oMBI&utm_content=274238204&utm_source=hs_email","pageId":"129928173457","urlParams":{"utm_campaign":"The Power Of Attack Graphs in the Cloud","utm_medium":"email","_hsmi":"274238266","_hsenc":"p2ANqtz-8dJm9gUK8gaQLhIyRemjpUCeewDwHi6JsQPVMVMqp72dBMPjfohYRUL_yGQDx5ZFwNvaxAsE3GeIs-pAGMa5bz6bIl74etKVNz4skDGDJ44N5oMBI","utm_content":"274238204","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://info.xmcyber.com/the-power-of-attack-graphs-in-cloud","contentType":"landing-page","hutk":"a4e1c8bfab96900fbdd92e965c37c76f","__hsfp":2350263003,"__hssc":"7655085.1.1694763718018","__hstc":"7655085.a4e1c8bfab96900fbdd92e965c37c76f.1694763718018.1694763718018.1694763718018.1","formTarget":"#hs_form_target_widget_1645772628185","formInstanceId":"9935","pageName":"The Power of Attack Graphs in Cloud","boolCheckBoxFields":"LEGAL_CONSENT.subscription_type_4619099","locale":"en","timestamp":1694763718030,"originalEmbedContext":{"portalId":"4156399","formId":"26ef84e2-ac04-4f4c-a3c6-a2990c9580a6","region":"na1","target":"#hs_form_target_widget_1645772628185","isBuilder":false,"isTestPage":false,"isPreview":false,"formInstanceId":"9935","formsBaseUrl":"/_hcms/forms","css":"","redirectUrl":"https://info.xmcyber.com/hubfs/XM%20Cyber%20eBook%20-%20Attack%20Graphs%20in%20Cloud.pdf","isMobileResponsive":true,"pageName":"The Power of Attack Graphs in Cloud","pageId":"129928173457","contentType":"landing-page","formData":{"cssClass":"hs-form stacked hs-custom-form"},"isCMSModuleEmbed":true},"correlationId":"d7ac7f6c-19ae-42d6-bb6e-e9aebfb6a369","renderedFieldsIds":["firstname","lastname","email","phone","video_name","jobtitle","demo_request","utm_term","utm_campaign","utm_medium","utm_content","utm_source","LEGAL_CONSENT.subscription_type_4619099"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.3743","sourceName":"forms-embed","sourceVersion":"1.3743","sourceVersionMajor":"1","sourceVersionMinor":"3743","_debug_allPageIds":{"embedContextPageId":"129928173457","analyticsPageId":"129928173457","pageContextPageId":"129928173457"},"_debug_embedLogLines":[{"clientTimestamp":1694763716878,"level":"INFO","message":"Retrieved customer callbacks used on embed context: [\"getExtraMetaDataBeforeSubmit\"]"},{"clientTimestamp":1694763716879,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"The Power of Attack Graphs in Cloud\",\"pageUrl\":\"https://info.xmcyber.com/the-power-of-attack-graphs-in-cloud?utm_campaign=The%20Power%20Of%20Attack%20Graphs%20in%20the%20Cloud&utm_medium=email&_hsmi=274238266&_hsenc=p2ANqtz-8dJm9gUK8gaQLhIyRemjpUCeewDwHi6JsQPVMVMqp72dBMPjfohYRUL_yGQDx5ZFwNvaxAsE3GeIs-pAGMa5bz6bIl74etKVNz4skDGDJ44N5oMBI&utm_content=274238204&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.62 Safari/537.36\",\"urlParams\":{\"utm_campaign\":\"The Power Of Attack Graphs in the Cloud\",\"utm_medium\":\"email\",\"_hsmi\":\"274238266\",\"_hsenc\":\"p2ANqtz-8dJm9gUK8gaQLhIyRemjpUCeewDwHi6JsQPVMVMqp72dBMPjfohYRUL_yGQDx5ZFwNvaxAsE3GeIs-pAGMa5bz6bIl74etKVNz4skDGDJ44N5oMBI\",\"utm_content\":\"274238204\",\"utm_source\":\"hs_email\"},\"pageId\":\"129928173457\",\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1694763716881,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"SG\""},{"clientTimestamp":1694763718024,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"a4e1c8bfab96900fbdd92e965c37c76f\",\"canonicalUrl\":\"https://info.xmcyber.com/the-power-of-attack-graphs-in-cloud\",\"contentType\":\"landing-page\",\"pageId\":\"129928173457\"}"}]}"><iframe
name="target_iframe_26ef84e2-ac04-4f4c-a3c6-a2990c9580a6_9935" style="display: none;"></iframe>
</form>
Text Content
THE POWER OF ATTACK GRAPHS IN CLOUD In the ever-evolving landscape of cybersecurity, organizations use various tools and systems to identify and address security vulnerabilities. But despite these efforts, a definite challenge still remains – the inability to visualize how these vulnerabilities interconnect and create critical security gaps. This is an even greater challenge as organizations move to the cloud. Keeping your cloud environment secure requires a fresh perspective, one that brings clarity to the relationships between various security components, identifying potential attack paths that can threaten valuable assets. Dig in to our new eBook, The Power of Attack Graphs in Cloud, to learn how to: * Understand attack paths within cloud environments * Cut them off at key junctures to prevent harm to critical assets * Align Security and IT teams for better, faster remediation DOWNLOAD NOW! Would you like a demo of XM Cyber? Please SelectYesNot right now UTM Term UTM Campaign UTM Medium UTM Content UTM Source * By signing up you are agreeing to receive occasional marketing, product and event updates from XM Cyber. You can unsubscribe at any time. By submitting the form, I acknowledge that I have read the Privacy Policy. * XM CYBER, 2023 Schedule a demo See XM Cyber in action A XM Cyber representative will get back to you within 2 business days