Cyber Resilience

Firewall security graphic highlighting network security

7 Firewall Best Practices for Securing Your Network

Network security and reliability are paramount to business success. For network administrators, a network firewall is the most crucial security tool for network cyber resilience, so it has to be as robust as possible. However, network firewall configuration can be challenging as you have to strike the perfect balance between security and user performance. Cyber […]

Q&A: Fireside Chat with Rekha Shenoy on Cyber Resilience in 2025

Originally shared on March 27, 2025, by ITProToday, Information Week Virtual Event and edited for length and clarity. This event focused on cyber resilience in 2025 and explored strategies for maintaining business continuity. BackBox CEO, Rekha Shenoy, addressed this challenge during a fireside chat, highlighting that cyber resilience necessitates a more continuous approach to remediation.

AI and Automation: Key Pillars for Building Cyber Resilience

Originally published in Cybersecurity Insiders on March 7, 2025 According to Gartner’s latest Hype Cycle for I&O Automation, by 2026, 50% of enterprises are expected to use AI functions to automate Day 2 network operations, compared to fewer than 10% in 2023. This is where the newest innovation in AI, distinct from ML, is enabling additional

vulnerability lifecycle

Managing the Vulnerability Lifecycle with Intelligence and Speed

Vulnerability management is a fundamental element of cyber hygiene. So, why do 56% of organizations report that their most recent data breach resulted from a known vulnerability not properly patched or addressed? As networks become more complex and include network and security devices from multiple vendors, vulnerabilities increase, putting pressure on teams to identify and

Fortinet Addresses Multiple Critical and High-Risk Flaws

This month, Fortinet released a significant security update that addressed multiple vulnerabilities. This addresses issues across its product portfolio, including FortiOS, FortiProxy, FortiManager, and FortiAnalyzer. Such disclosures are not uncommon. However, they pose a challenge to network and security professionals striving to secure their networks. Already overwhelmed, news of new vulnerabilities might not even cut

Network Vulnerability Management

Threat Exposure vs Risk Management

Why risk management? Risk and risk mitigation involve predicting future probabilities and investing to minimize the likelihood of a breach. Predicting the future is a fool’s game with uncertain and unknowable outcomes. Risk modeling, they say, becomes security theater. Risk Assessment has transformed into a tool for persuasion—essentially, “security theater”— instead of serving as a

Building Network Cyber Resilience in Manufacturing Starts with the Basics

What is Network Vulnerability Intelligence?

Network vulnerability management is the discipline of tracking, identifying, understanding, and remediating network device (routers, switches, load balancers) and security device (firewalls, IPSs) vulnerabilities. Networks provide the backbone for today’s digital businesses and present a rich target for malicious actors who wish to exploit network and security device vulnerabilities to achieve their goals.  Key components

What to Look for in a Network Vulnerability Intelligence Solution

Network vulnerability management is challenging for a few reasons. Devices are difficult to update, organizations often have a very heterogeneous environment with multiple vendors for network and security gear, and most security products are not purpose-built for network teams, which means people need to connect security products to what they mean in their environment. That

Set Your Network Vulnerability Intelligence Program on the Right Course

Vulnerability intelligence is crucial for maintaining network security. As networks become increasingly complex, vulnerabilities rise, placing pressure on teams to identify and resolve these issues. There are two steps every network and security team should take to enhance their network security posture: Mitigate defined cybersecurity threats via programs that reduce an enterprise’s exposure to associated exploits

Top 5 Things to Know About Cyber Resilience for Network Devices

Originally published in Network Computing on December 26, 2024 Cyber resilience is crucial as organizations realize that attacks are inevitable. In 2024, 94% of cloud users experienced threats monthly, with 62% of those successfully compromised. Network devices are often overlooked in cyber resilience discussions, despite their importance to business operations. This piece explores why cyber