Blog

How BackBox Validates Vulnerability Data That’s Relevant to You

The odds of your network and security devices being disrupted by breaches are increasing. Threat actors exploit known vulnerabilities in devices such as firewalls and routers because they are prime targets for data gathering and cyber espionage, where bad actors can sit undetected for extended periods. And since 25% of network vulnerabilities remain unpatched for over one year, they […]

Building Network Cyber Resilience in Manufacturing Starts with the Basics

Building Network Cyber Resilience in Manufacturing Starts with the Basics

Originally published in Manufacturing Business Technology on September 25, 2025 Manufacturing is vital for global job creation, innovation, and economic growth, playing a key role in global trade and competitiveness. The operational technology (OT) networks, which include industrial control systems and IIoT devices, are complex and interconnected with IT networks, presenting significant risks. A study

Harnessing Automation to Bridge the Gap Between Network and Security

Harnessing Automation to Bridge the Gap Between Network and Security

Originally published in Cybersecurity Insiders, on September 26, 2025 In today’s IT landscape, network and security teams face growing complexity and limited resources. The rise of multi-cloud architectures and the increasing frequency of cyberattacks have rendered manual operations insufficient. Network automation is crucial for bridging the gap between these teams and enhancing enterprise protection. A

The Networking-Cybersecurity Paradox

Originally published in Cybersecurity Insiders on September 15, 2025. Businesses thrive when everyone is aligned, which highlights the intriguing “Networking-Cybersecurity Paradox.” Too much collaboration can lead to conflict due to overlap, while excessive separation results in teams passing requirements without working together toward common goals. Read the article to learn how you can break down

Uniting Teams to Strengthen Ransomware Resilience

Originally published in Industrial Equipment News on September 10, 2025. Verizon’s 2025 Data Breach Investigations Report (DBIR) indicates a 37% increase in ransomware attacks within the manufacturing industry, contributing to 44% of all breaches. Recent warnings highlight sophisticated phishing campaigns targeting supply chain-critical manufacturing companies. Additionally, a new FBI alert warns about threats to industrial

The Critical Failure in Vulnerability Management

The Critical Failure in Vulnerability Management

Originally published in Dark Reading on September 8, 2025 . The field of vulnerability management has slowed significantly, yet there are more vulnerabilities to handle than ever before. When core security measures face the same tough conditions, it’s important to take notice. More realistically, it’s a final warning that the industry must reshape itself quickly to

network automation and security

7 Steps to Improving Network Security Through Automation

When we think about network security, we often focus on vulnerabilities or exploits, internal threats, and password compromises. However, we don’t often consider automation. Anything that can negatively impact network cyber resiliency and recovery of the entire operation after an ‘event’ relates to security. Automation helps maintain optimal network performance and security. With that in

Network configuration management

What is Network Configuration Management?

Network configuration management is a set of tools or capabilities that support network engineers in performing their day-to-day roles in managing the lifecycle of network devices, including monitoring, maintaining, and updating configurations. These solutions are meant to improve team efficiency and reduce manual errors that result from the tedious task of device administration. Key components

Network automation

Why Automate?

At BackBox, we discuss automation as if it’s the best choice for everyone without questioning why that may be the case. We talk about features, and we have the best backup solution, among other things. Why would you automate? What are you doing today that would benefit from some automation, particularly the kind that aligns