Cyber Resilience

BackBox Awarded 2024 IT Cybersecurity Excellence Award

We are excited to share that TMC has named the BackBox Network Cyber Resilience Platform, a recipient of the 2024 IT Cyber Security Excellence Award.  TMC announced the 2024 winners in a press release on its website last week. According to TMC, this award highlights not only the technologies used but also best practices for […]

5 Ways BackBox Helps Organizations with the EU Cyber Resilience Act

The EU Cyber Resilience Act (CRA) establishes requirements for digital product cybersecurity across the European Union. BackBox, using its ML-powered network vulnerability intelligence platform, can help meet these requirements using our ML-powered network vulnerability platform, and offers valuable tools to help meet the CRA’s standards and keep the network safe. BackBox helps with cyber resilience by

Automate DORA Compliance with Confidence

The Digital Operational Resilience Act (DORA) is a crucial regulation for financial institutions operating within the European Union. Starting January 17, 2025, DORA mandates that banks, insurance companies, and information and communications technology (ICT) service providers, over 22,000 entities within the EU, adhere to specific rules designed to strengthen their ability to withstand and recover

Ensuring Network Cyber Resilience in the Face of Modern Threats

In today’s network-dependent world, resilient infrastructure is crucial for uninterrupted business operations despite disruptions. However, network engineers face growing challenges as cybercriminals leverage artificial intelligence (AI) to exploit vulnerabilities quickly. In 2023, the average time to exploit a vulnerability was just 44 days, with 25% of vulnerabilities exploited on the same day they were discovered

A CISOs Guide to Creating a Cyber Resilience Toolkit

Originally published in Security Magazine on October 21, 2024   Every chief information security officer (CISO) understands that it is not a question of “if” their systems will be disrupted, but “when.” This saying continues to resonate with security leaders, especially as network environments become more challenging to protect. This challenge arises from two main factors:

Strengthening Cyber Resilience for Network Devices: A Strategic Imperative

Originally published in VMblog on October 10, 2024 The importance of cyber resilience for network infrastructure cannot be overstated. Networks are essential for the digital landscape, and any disruption can significantly impact business operations. Threat actors are increasingly skilled at exploiting vulnerabilities, with attackers in 2023 averaging just 44 days to exploit known issues, and

Cyber resilience illustration with a padlock and computer software

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Modern networks consist of corporate, industrial, on-prem, and cloud networks. The move to digital transformation and remote work has added exponential complexity. We’re continuing to evolve and scale our networks, making them even more complex as we introduce AI. More than half of CEOs say they already use generative AI to increase efficiency. As our

Revolutionizing Network Automation for Enhanced Cyber Resilience

Originally published in VMblog on September 3, 2024 In today’s world of evolving cyber threats, resilient network infrastructure is crucial for businesses. VMblog recently spoke with Amar Ramakrishnan, VP of Product Management at BackBox, about the importance of network automation for cyber resilience. BackBox, a security-focused network device automation platform, is transforming how enterprises and

Packet Pushers Podcast

Q&A: How BackBox Helps You Mitigate CVEs for Network Devices

Originally published on August 7, 2024 by Packet Pushers and edited for length and clarity This discussion concerns network configuration compliance in the face of never-ending common vulnerabilities and exposures, or CVEs. If you can automate that compliance, you have a shot at keeping pace with the bots attacking those CVEs and attempting to breach