Security

Cyber resilience illustration with a padlock and computer software

When Cyber Resilience Lags IT Exploits, Automation is the Answer

Modern networks consist of corporate, industrial, on-prem, and cloud networks. The move to digital transformation and remote work has added exponential complexity. We’re continuing to evolve and scale our networks, making them even more complex as we introduce AI. More than half of CEOs say they already use generative AI to increase efficiency. As our […]

When Cyber Resilience Lags IT Exploits, Automation is the Answer Read More »

5 Ways BackBox Helps Organizations with the EU Cyber Resilience Act

BackBox Network Vulnerability Manager helps with cyber resilience by automating the remediation of network device vulnerabilities, and enables network administrators to manage the full-lifecycle of device vulnerabilities. The EU Cyber Resilience Act (CRA) establishes requirements for digital product cybersecurity across the European Union. BackBox can help meet these requirements using our ML-powered network vulnerability platform,

5 Ways BackBox Helps Organizations with the EU Cyber Resilience Act Read More »

Network Vulnerability Management

What is Network Vulnerability Management?

Abstract: Network vulnerability management is an important part of network upkeep. Tracking vulnerabilities, understanding their impact on the network, and remediating them helps protect the network from cyberattack. But it is often a time-consuming, labor-intensive process and, therefore, doesn’t get the attention required. Table of Contents A New Network Vulnerability Management Approach: Risk management vs

What is Network Vulnerability Management? Read More »

Network Vulnerability Management

Fortinet Discloses 5 Critical and High Severity Bugs

In early March, Fortinet disclosed five new vulnerabilities. This sort of disclosure (from network companies in general) is not unusual. However, unusual or not, it presents a challenge to network administrators trying to keep their networks secure. Here’s the fundamental challenge, from some BackBox sponsored research from last year: 92% say more network updates are

Fortinet Discloses 5 Critical and High Severity Bugs Read More »

From 10 hours to 30 minutes: The Hidden Value of Automating One-off Tasks

A blog series that shines a spotlight on real-world moments where network engineers use BackBox security-centric automation to save their organizations from costly downtime and surprises. Synopsis A Managed Service Provider (MSP) customer urgently needed to activate licenses across 92 Palo Alto firewalls. Compounding the challenge, this had to be done within two days, but

From 10 hours to 30 minutes: The Hidden Value of Automating One-off Tasks Read More »

BackBox and Healthcare

The Cybersecurity and Infrastructure Security Agency (CISA) has recently released a healthcare-specific cybersecurity vulnerability mitigation guide. The guide focuses on addressing critical vulnerabilities and provides a proactive approach to combatting cyber threats. I thought it would be useful to examine the three mitigation strategies in this report as they related to BackBox in healthcare and

BackBox and Healthcare Read More »