Making Infosec Jobs Easier: Preventing Data Loss and Fraud
This is post 5 in our series on making infosec jobs easier and covers how cybersecurity teams can adjust to changes in IT landscape. The first post covered improving overall security posture. The second post discussed assessing and reporting on breach risk. The third post was all about keeping systems ... Read More
Report: Organizations Lack Visibility into Their Top Risks
Yesterday, Balbix and Cybersecurity Insiders published the 2020 State of Security Posture Report, revealing key findings around the attitudes that infosec teams have about their security posture and the biggest challenges they face when trying to improve it. Most notably, 64% of organizations say they are, at best, somewhat confident ... Read More
Employee Spotlight: Jennifer Williams
Jennifer Williams is a Front End Software Engineer at Balbix. Jennifer is responsible for implementing all parts of the Balbix platform that users see and interact with. Learn more about her in the video above and Q&A below! Q: Tell me a little about what you do at Balbix As ... Read More
8 Key Areas to Improve Cybersecurity Efficiency
In an effort to build and support a comprehensive and mature cybersecurity program, organizations have, through no fault of their own, unintentionally assembled dozens of point solutions over the last decade and beyond. While intentions were sound, logic was lost. During this same stretch of time, astounding technological advancements have ... Read More
6 Slides Every CISO Should Use in Their Board Presentation
The end of the quarter is fast approaching and it’s time to put together your slide deck for the board meeting. Before you begin creating bulleted slides for all the projects your team is working on, take a moment to zoom out. What do your board of directors and C-suite ... Read More
Perception vs. Reality in Cybersecurity
The topic of implicit bias has taken an elevated stage lately due to recent events. These events show us just how harmful inaccurate perceptions can be, yet we often forget that everyone has their own implicit biases. False realities play out in almost every profession as the human brain works ... Read More
5 Steps to Measure and Assess Security Posture
In cybersecurity, there are a million things you can measure. Many infosec professionals have worked under a boss who requires that a certain number of patches be implemented every week. Others have spent months on end training employees in cyber hygiene, focused on the quantity of staff who view their ... Read More
Become a Vulnerability Management Guru in 10 Days
Vulnerability management has become the cornerstone of cybersecurity programs, and is critical to maintaining a strong security posture. As security issues abound with rapidly changing attack surfaces and advancements in technology, vulnerability experts are now a must-have for infosec teams. They are on the front lines of securing weak spots ... Read More
The 4 Most Important Components of Security Posture (Part 2 – People)
This is part 2 of the blog series, The 4 Most Important Components of Security Posture. You can read Part 1 here ... Read More
Security Posture Questions (and Answers)
Knowledge is power, especially for CISOs. Without a comprehensive understanding of their security posture, however, defending the enterprise becomes a game of gut feelings ... Read More

