Security

Network Vulnerability Management

What is Network Vulnerability Intelligence?

Network vulnerability management is the discipline of tracking, identifying, understanding, and remediating network device (routers, switches, load balancers) and security device (firewalls, IPSs) vulnerabilities. Networks provide the backbone for today’s digital businesses and present a rich target for malicious actors who wish to exploit network and security device vulnerabilities to achieve their goals.  Key components […]

What to Look for in a Network Vulnerability Intelligence Solution

Network vulnerability management is challenging for a few reasons. Devices are difficult to update, organizations often have a very heterogeneous environment with multiple vendors for network and security gear, and most security products are not purpose-built for network teams, which means people need to connect security products to what they mean in their environment. That

Set Your Network Vulnerability Intelligence Program on the Right Course

Vulnerability intelligence is crucial for maintaining network security. As networks become increasingly complex, vulnerabilities rise, placing pressure on teams to identify and resolve these issues. There are two steps every network and security team should take to enhance their network security posture: Mitigate defined cybersecurity threats via programs that reduce an enterprise’s exposure to associated exploits

Top 5 Things to Know About Cyber Resilience for Network Devices

Originally published in Network Computing on December 26, 2024 Cyber resilience is crucial as organizations realize that attacks are inevitable. In 2024, 94% of cloud users experienced threats monthly, with 62% of those successfully compromised. Network devices are often overlooked in cyber resilience discussions, despite their importance to business operations. This piece explores why cyber

BackBox Achieves SOC 2 Type 2 Compliance

Organizations are increasingly concerned about the security, privacy, availability, and integrity of shared data. The BackBox cyber resilience platform prioritizes privacy and security to maintain data confidentiality and integrity.  This commitment is demonstrated by our achievement of SOC 2 Type 2 attestation, which offers independent validation that our security controls and operational processes adhere to

Ensuring Network Cyber Resilience in the Face of Modern Threats

In today’s network-dependent world, resilient infrastructure is crucial for uninterrupted business operations despite disruptions. However, network engineers face growing challenges as cybercriminals leverage artificial intelligence (AI) to exploit vulnerabilities quickly. In 2023, the average time to exploit a vulnerability was just 44 days, with 25% of vulnerabilities exploited on the same day they were discovered

A CISOs Guide to Creating a Cyber Resilience Toolkit

Originally published in Security Magazine on October 21, 2024   Every chief information security officer (CISO) understands that it is not a question of “if” their systems will be disrupted, but “when.” This saying continues to resonate with security leaders, especially as network environments become more challenging to protect. This challenge arises from two main factors:

Revolutionizing Network Automation for Enhanced Cyber Resilience

Originally published in VMblog on September 3, 2024 In today’s world of evolving cyber threats, resilient network infrastructure is crucial for businesses. VMblog recently spoke with Amar Ramakrishnan, VP of Product Management at BackBox, about the importance of network automation for cyber resilience. BackBox, a security-focused network device automation platform, is transforming how enterprises and

Revolutionizing Network Security Automation

Originally published in Cyber Defense Magazine on September 2, 2024 Cyber Defense Magazine recently interviewed Rekha Shenoy, CEO of BackBox, at the BlackHat conference. Her insights into the technology industry and network security are truly inspiring. This article explores Rekha’s dedication to tackling the complex challenges that network engineers encounter today. As networks become more