Blog

Bright illustration of AI guiding network automation through transparent connections, representing explainable security and human-centric oversight.

AI as Trusted Advisor, Not Autonomous Agent

We’re excited to share that our very own Richard Philips, VP of Technology and Infrastructure, was featured in VMblog’s January 8, 2026, 5 Bold 2026 Tech Predictions Video. In the video, Richard warns that although AI in security has arrived, be wary of automating everything everywhere as fast as possible. The next era of IT […]

network vulnerability illustration

Fortinet Flaw from 2020 Resurfaces: How to Avoid an Unwelcome Surprise

Fortinet’s December 24, 2025, product security advisory is an important reminder that threat actors: Plan on reduced staffing levels during the holidays to launch attacks Often follow a path of least resistance – leveraging old, unpatched vulnerabilities to gain access to systems  The post warns that attackers are exploiting an unpatched critical FortiOS vulnerability, CVE-2020-12812,

When Breadth and Scale are the Enemies, AI and Automation Win Blog Post

When Breadth and Scale are the Enemies, AI and Automation Win

Originally published on page 152 in Cyber Defense eMagazine – December 2025 Edition. Recent headlines have reminded us that a seemingly simple issue — a DNS error that prevented users from accessing certain services — can lead to cascading failures, costing billions and affecting millions. In reality, systems rarely fail straightforwardly. Typically, multiple fixes are

Why Your Competitors Are Using API-driven OS updates for Network Devices (Example code included so you can too)

A set of guidance led by international cybersecurity governing authorities warns that network infrastructure devices, including firewalls, routers, and virtual private network (VPN) gateways, are often easy targets for attackers. They recommend keeping network device OSs up to date because patches frequently contain security vulnerability fixes. In contrast, many teams we communicate with about updates

AI is the future of network automation

Responsible AI is the Future of Network Automation

Originally published in VMblog.com on November 24, 2025 BackBox CEO Rekha Shenoy joined other industry executives and experts to share their predictions for 2026 in VMblog’s 18th annual 2026 Modern Data Center Technology Prediction Series. Here she discusses how AI has transformed from an experimental technology into a vital force driving change across all sectors

Gaining Control: The Human Role in AI-Driven Automation

Gaining Control: The Human Role in AI-Driven Automation

Originally published in ITBrief on November 19, 2025 A recent Pew Research survey shows that half of American adults are more worried than excited about the increasing use of AI. Many network infrastructure owners share these worries, concerned about how AI-driven automation might affect network reliability. Because the network is crucial to operations, concerns about

Visual for business of network cybersecurity ownership.

The Business of Network Cybersecurity Ownership

Ownership and maintenance usually go together. When you own something, you’re generally responsible for taking care of it. I initially thought this principle would apply in network infrastructure discussions but soon realized that it was not so simple. Setting Context Around Cybersecurity Risk The context I’m referring to is the cybersecurity risk related to network

BackBox SOC 2 Type 2 Compliance 2025

BackBox Achieves SOC 2 Type 2 Compliance for 2025

Organizations are increasingly concerned about the security, privacy, availability, and integrity of shared data. The BackBox network cyber resilience platform prioritizes privacy and security to maintain data confidentiality and integrity. This commitment is demonstrated by our continuous achievement of SOC 2 Type 2 attestation, which offers independent validation that our security controls and operational processes

How NetSecOps Strengthens Security and Network Agility

The NetSecOps Imperative: Why Network and Security Teams Must Collaborate in the Hybrid Cloud Era

Originally published in Cybersecurity Insiders, on October 28, 2025 In today’s enterprise, the boundaries between network and security operations have become increasingly blurred. The emergence of hybrid and multi-cloud architectures has produced a complex digital environment that is challenging to manage effectively from a single perspective. For too long, network and security teams have worked