Cyber Resilience

AI is the future of network automation

Responsible AI is the Future of Network Automation

Originally published in VMblog.com on November 24, 2025 BackBox CEO Rekha Shenoy joined other industry executives and experts to share their predictions for 2026 in VMblog’s 18th annual 2026 Modern Data Center Technology Prediction Series. Here she discusses how AI has transformed from an experimental technology into a vital force driving change across all sectors

Visual for business of network cybersecurity ownership.

The Business of Network Cybersecurity Ownership

Ownership and maintenance usually go together. When you own something, you’re generally responsible for taking care of it. I initially thought this principle would apply in network infrastructure discussions but soon realized that it was not so simple. Setting Context Around Cybersecurity Risk The context I’m referring to is the cybersecurity risk related to network

How NetSecOps Strengthens Security and Network Agility

The NetSecOps Imperative: Why Network and Security Teams Must Collaborate in the Hybrid Cloud Era

Originally published in Cybersecurity Insiders, on October 28, 2025 In today’s enterprise, the boundaries between network and security operations have become increasingly blurred. The emergence of hybrid and multi-cloud architectures has produced a complex digital environment that is challenging to manage effectively from a single perspective. For too long, network and security teams have worked

Responsible AI and network automation concept illustration

BackBox Principles for Responsible Artificial Intelligence (AI)

Artificial Intelligence (AI) has undergone significant evolution over the years, presenting both exciting opportunities and unique challenges for businesses. Cybercriminals can now identify vulnerabilities in record time — within days, rather than months or years — creating a pressing need for enhanced defenses. Fortunately, AI has emerged as a powerful ally in bolstering network cyber

Network cyber resilience and automation for F5 vulnerabilities

Navigating F5’s Security Update Addressing Multiple Vulnerabilities

F5 has issued a significant security advisory and released updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients. These updates address risks from nation-state threat actors that broke into F5’s systems and stole files containing some of BIG-IP’s source code and information related to undisclosed vulnerabilities in the product. Underscoring the urgency,

How BackBox Validates Vulnerability Data That’s Relevant to You

The odds of your network and security devices being disrupted by breaches are increasing. Threat actors exploit known vulnerabilities in devices such as firewalls and routers because they are prime targets for data gathering and cyber espionage, where bad actors can sit undetected for extended periods. And since 25% of network vulnerabilities remain unpatched for over one year, they

Building Network Cyber Resilience in Manufacturing Starts with the Basics

Building Network Cyber Resilience in Manufacturing Starts with the Basics

Originally published in Manufacturing Business Technology on September 25, 2025 Manufacturing is vital for global job creation, innovation, and economic growth, playing a key role in global trade and competitiveness. The operational technology (OT) networks, which include industrial control systems and IIoT devices, are complex and interconnected with IT networks, presenting significant risks. A study

Network configuration management

What is Network Configuration Management?

Network configuration management is a set of tools or capabilities that support network engineers in performing their day-to-day roles in managing the lifecycle of network devices, including monitoring, maintaining, and updating configurations. These solutions are meant to improve team efficiency and reduce manual errors that result from the tedious task of device administration. Key components