Vulnerability Intelligence

Network cyber resilience and automation for F5 vulnerabilities

Navigating F5’s Security Update Addressing Multiple Vulnerabilities

F5 has issued a significant security advisory and released updates for BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients. These updates address risks from nation-state threat actors that broke into F5’s systems and stole files containing some of BIG-IP’s source code and information related to undisclosed vulnerabilities in the product. Underscoring the urgency, […]

How BackBox Validates Vulnerability Data That’s Relevant to You

The odds of your network and security devices being disrupted by breaches are increasing. Threat actors exploit known vulnerabilities in devices such as firewalls and routers because they are prime targets for data gathering and cyber espionage, where bad actors can sit undetected for extended periods. And since 25% of network vulnerabilities remain unpatched for over one year, they

network automation and security

7 Steps to Improving Network Security Through Automation

When we think about network security, we often focus on vulnerabilities or exploits, internal threats, and password compromises. However, we don’t often consider automation. Anything that can negatively impact network cyber resiliency and recovery of the entire operation after an ‘event’ relates to security. Automation helps maintain optimal network performance and security. With that in

Patching Security Vulnerabilities

There’s always a layer of details that differentiates between easy and simple. BackBox enhances network security by making network software upgrades for patching security vulnerabilities accessible and straightforward. Let me first illustrate the difference between easy and simple with an example that most people can grasp. Just File a Claim The U.S. healthcare system includes

5 Questions to Help Keep Your Network Safe

Network vulnerability management is intended to help network administrators prioritize OS updates based on actual risk to the organization. In theory, updating devices sounds easy. Every vendor provides software updates so you can implement them. In practice, however, it’s not. Because the quality of update tooling varies by vendor and updating at scale can be

Ransomware and Your Network

Network teams and the devices they manage are not the usual audience for discussions about ransomware. Ransomware affects endpoints and is often the purview of IT administrators and security teams. However, once data is encrypted and/or stolen, the costs of a ransomware attack snowball – as much as 1,000 times higher than if an incident

vulnerability lifecycle

Managing the Vulnerability Lifecycle with Intelligence and Speed

Vulnerability management is a fundamental element of cyber hygiene. So, why do 56% of organizations report that their most recent data breach resulted from a known vulnerability not properly patched or addressed? As networks become more complex and include network and security devices from multiple vendors, vulnerabilities increase, putting pressure on teams to identify and

Fortinet Addresses Multiple Critical and High-Risk Flaws

This month, Fortinet released a significant security update that addressed multiple vulnerabilities. This addresses issues across its product portfolio, including FortiOS, FortiProxy, FortiManager, and FortiAnalyzer. Such disclosures are not uncommon. However, they pose a challenge to network and security professionals striving to secure their networks. Already overwhelmed, news of new vulnerabilities might not even cut

Network Vulnerability Management

Threat Exposure vs Risk Management

Why risk management? Risk and risk mitigation involve predicting future probabilities and investing to minimize the likelihood of a breach. Predicting the future is a fool’s game with uncertain and unknowable outcomes. Risk modeling, they say, becomes security theater. Risk Assessment has transformed into a tool for persuasion—essentially, “security theater”— instead of serving as a

Building Network Cyber Resilience in Manufacturing Starts with the Basics

What is Network Vulnerability Intelligence?

Network vulnerability management is the discipline of tracking, identifying, understanding, and remediating network device (routers, switches, load balancers) and security device (firewalls, IPSs) vulnerabilities. Networks provide the backbone for today’s digital businesses and present a rich target for malicious actors who wish to exploit network and security device vulnerabilities to achieve their goals.  Key components