Why is asset deduplication a hard problem?

| | security posture
“If you cannot count it, you cannot manage it.” – Every CISO and CIO ever Asset deduplication is a crucial challenge in exposure management (and CAASM). In today’s complex IT environments, effective management of vulnerabilities and other findings relies on accurate asset inventories to understand and mitigate potential risks. Assets ... Read More

4th generation vulnerability prioritization: what is the buzz all about?  

| | security posture
In the rapidly evolving world of cybersecurity, staying ahead of threats requires more than just reactive measures—it demands foresight and precision. Enter the 4th generation of vulnerability prioritization, a paradigm shift that’s redefining how organizations approach their exposure management strategies. But what exactly is this new wave of prioritization, and ... Read More

Post DBIR 2024: 7 Ways to Reduce Your Cyber Risk

The Verizon DBIR is the most anticipated annual report on data breaches with many incredible insights, and this year is no exception. The most surprising finding is the rapid explosion in vulnerability exploitation, which now constitutes one of the most critical paths to initiating breaches. Balbix is a data contributor ... Read More

Measure what matters: Why MTTR is an incomplete cybersecurity metric? And what can you do about it?

“The line between disorder and order lies in logistics …” Sun Tzu   “The line between disorder and order lies in data driven analytics …” modern cybersecurity One of the most important weapons of Alexander the Great was analytics and logistics. He gathered intelligence on the enemy’s weapons, supply sources, ... Read More
Hunting for Log4j Vulnerabilities: A Fortune 100 Case Study

Hunting for Log4j Vulnerabilities: A Fortune 100 Case Study

Finding Log4j Instances in Runtime and Tracking Completed Remediation at a Fortune 100 Company Time is a funny thing. It’s hard to believe that it’s already been just over a month since Log4Shell, a zero-day vulnerability in the Java logging tool Log4j, was publicly disclosed on December 9th, 2021. The ... Read More
Broad Exposure to Log4shell CVE-2021-44228 Highlights How the Attack Surface Has Exploded

Broad Exposure to Log4shell CVE-2021-44228 Highlights How the Attack Surface Has Exploded

The critical vulnerability CVE-2021-44228 was found in the Java logging library Log4j versions 2.0 to 2.14.1. An exploit known as “Log4shell” was publicly disclosed on December 9th and is being actively exploited in the wild. It is highly recommended this flaw be patched as soon as possible. In the first ... Read More
Spotlight on the Balbix 2021 Internship Program

Spotlight on the Balbix 2021 Internship Program

Summer is one of the most anticipated times of the year at Balbix. It’s not because the days get longer, or because general relaxation sets in after the frenetic pace of the beginning of the year. It’s because every year, we sift through hundreds of resumes, interview dozens of smart ... Read More
Invisible Battles and Hidden Figures

Invisible Battles and Hidden Figures

| | security posture
If you are in the cybersecurity business like me, these last few days have felt surreal. The SolarWinds hack is akin to waking up one day and discovering that your home alarm system was compromised 9 months ago, and burglars have been in and out of your home without you ... Read More
Invisible Battles and Hidden Figures

Invisible Battles and Hidden Figures

| | security posture
If you are in the cybersecurity business like me, these last few days have felt surreal. The SolarWinds hack is akin to waking up one day and discovering that your home alarm system was compromised 9 months ago, and burglars have been in and out of your home without you ... Read More
cybersecurity edge data breaches gap cybersecurity remote

Managing a Remote Workforce During COVID-19

COVID-19 has forced a rapid shift from office life to a fully remote work culture and increased reliance on digital infrastructure. Accompanying this shift is a 667% increase in coronavirus-related cyberattacks since the end of February, ranging from business email compromises to scams and brand impersonation. Additionally, the FBI Internet ... Read More
Security Boulevard