Evolution of VM: Which generation are you?

As the need for greater operational efficiency in cyber risk management has increased over the past ten years, the industry has seen a discernible shift from the conventional use of Common Vulnerability Scoring System (CVSS) metrics towards a more holistic approach that aligns with risk-driven prioritization. This transformation reflects a ... Read More

Why Traditional Vulnerability Management Prioritization Fails and a Risk-Based Approach Succeeds

As the need for greater operational efficiency in cyber risk management has increased over the past ten years, the industry has seen a discernible shift from the conventional use of Common Vulnerability Scoring System (CVSS) metrics towards a more holistic approach that aligns with risk-driven prioritization. This transformation reflects a ... Read More

Balbix’s Approach to Cyber Risk Quantification Supercharged by AI

In this third and final post in the series on how AI plays a crucial role in cyber risk management, we will combine what we have learned in the previous posts on attack surface management and vulnerability prioritization. We will show you the role of risk quantification and how Balbix ... Read More

Prioritizing Cyber Risk: Get a leg up with AI

In the previous blog post, we described how Balbix leverages AI to provide a unified and comprehensive visibility into your attack surface. Establishing it requires deduplicating, normalizing, and correlating data from dozens of tools, which becomes a foundational requirement for cyber risk management. In this blog, we will outline how ... Read More

Understanding Your Attack Surface: AI or bust

Creating an accurate inventory of an organization’s assets and applications while ensuring no duplicates or omissions is essential for any IT and security program. Security teams must understand vulnerabilities associated with their assets, their exposure and the blast radius to prioritize assets for remediation and meet their SLAs effectively.  A ... Read More