Security

network automation and security

7 Steps to Improving Network Security Through Automation

When we think about network security, we often focus on vulnerabilities or exploits, internal threats, and password compromises. However, we don’t often consider automation. Anything that can negatively impact network cyber resiliency and recovery of the entire operation after an ‘event’ relates to security. Automation helps maintain optimal network performance and security. With that in […]

Tips For Organizations’ Network Security

As a company grows, the amount of data it handles daily grows as well. Some of the most valuable information can include customer or employee personally identifiable information (PII), and the company’s intellectual property (IP), and other proprietary information. With a majority of businesses handling their data on a laptop connected to Wi-Fi or a

Cisco, CIS Compliance, and BackBox

CIS compliance is complicated. It’s a baseline set of benchmarks defined by the Center for Internet Security for protecting systems like network devices or firewalls. CIS Benchmarks align with essential industry regulations, including the NIST Cybersecurity Framework (CSF), NIST SP 800-53, ISO 27000 series, PCI DSS, HIPAA, and others. As a result, organizations prioritizing CIS

Managing a Modern, Heterogeneous, Hybrid Network with Automation

It has been five years since businesses quickly turned to a distributed workforce supported by hybrid network environments that include physical and virtual devices from multiple vendors spanning cloud and on-premises infrastructure. Those who embraced these shifts successfully navigated the uncertainty, but the repercussions for network teams have been significant. Accelerated digital transformation, work-from-anywhere models,

Patching Security Vulnerabilities

There’s always a layer of details that differentiates between easy and simple. BackBox enhances network security by making network software upgrades for patching security vulnerabilities accessible and straightforward. Let me first illustrate the difference between easy and simple with an example that most people can grasp. Just File a Claim The U.S. healthcare system includes

Don’t Let Your Cybersecurity Make You Uninsurable

We have become numb to the impacts of cybersecurity breaches. A new breach is reported in the news almost weekly, making it seem impossible to prevent it. However, a significant change is underway that you need to plan for. Insurance companies that help pick up the pieces are developing views on how businesses should protect

5 Questions to Help Keep Your Network Safe

Network vulnerability management is intended to help network administrators prioritize OS updates based on actual risk to the organization. In theory, updating devices sounds easy. Every vendor provides software updates so you can implement them. In practice, however, it’s not. Because the quality of update tooling varies by vendor and updating at scale can be

Ransomware and Your Network

Network teams and the devices they manage are not the usual audience for discussions about ransomware. Ransomware affects endpoints and is often the purview of IT administrators and security teams. However, once data is encrypted and/or stolen, the costs of a ransomware attack snowball – as much as 1,000 times higher than if an incident

vulnerability lifecycle

Managing the Vulnerability Lifecycle with Intelligence and Speed

Vulnerability management is a fundamental element of cyber hygiene. So, why do 56% of organizations report that their most recent data breach resulted from a known vulnerability not properly patched or addressed? As networks become more complex and include network and security devices from multiple vendors, vulnerabilities increase, putting pressure on teams to identify and

Network Vulnerability Management

Threat Exposure vs Risk Management

Why risk management? Risk and risk mitigation involve predicting future probabilities and investing to minimize the likelihood of a breach. Predicting the future is a fool’s game with uncertain and unknowable outcomes. Risk modeling, they say, becomes security theater. Risk Assessment has transformed into a tool for persuasion—essentially, “security theater”— instead of serving as a