September 24, 2025
How to Contain a Crisis: Jaguar Land Rover’s Cyberattack Response Highlights the Need for Zero Trust in Manufacturing
Author: Sri Sundaralingam, Chief Marketing Officer, Xage Security The automotive industry blends cutting-edge digital systems with complex, globally distributed production. That IT–OT (Operational Technology) convergence has unlocked vast efficiencies—but it’s…
September 22, 2025
Full-Stack, Zero Trust Protection for the Modern Data Center
Author: Roman Arutyunov, Co-Founder and SVP Products, Xage Security The rise of AI has transformed data centers into far more than hubs for corporate data and enterprise applications. They now…
February 4, 2025
Boardroom Defense: Questions About Cybersecurity
Author: Duncan Greatwood, Executive Chair, Xage Security How can company boards ensure they are addressing escalating cyber threats? Positioned at opposite ends of the business, board members and security executives…
January 7, 2025
Privilege Escalation Threats: Fortifying Security With An Access Management Strategy
In our increasingly digital world, companies managing information technology (IT) and operational technology (OT) systems must scrutinize their cybersecurity strategies closely. As cyber techniques evolve and threat actors exploit vulnerabilities…
September 19, 2024
Just In Time Access and Session Termination
Author: Chase Snyder, Sr. Product Marketing Manager at Xage Security Just-in-time (JIT) access is an approach to reducing the risk of a privileged account being abused by cyberattackers. JIT access…
September 6, 2024
Resource Roundup: Deep Dive Articles on Privilege Escalation
Author: Carol Caley, PMM, Xage Security Unfortunately, privilege escalation has been big in the news lately, from disclosed vulnerabilities to their active exploitation. The concept seems simple on its face:…
August 22, 2024
Privilege Escalation Techniques: An Exploration via Examples
Author: Carol Caley, PMM, Xage Security In a recent Patch Tuesday, Microsoft shared a whopping 88 vulnerabilities. The most common type? Privilege escalation, with 36 of the disclosed vulnerabilities involving…