Balbix Guide to XZ Utils Backdoor

Executive Summary On March 29, 2024, developer Andres Freund reported the discovery of a backdoor in XZ Utils, affecting v5.6.0 and 5.6.1. XZ Utils, which provides compression tools for the .xz format, ...
Apple research study, data breaches, immutable storage, backup storage, ransomware data backup

The Five Essentials of Immutable Storage: Why They Matter

Organizations need a robust backup strategy that can outsmart bad actors. And these days, that strategy must include immutability ...
Security Boulevard
ransomware, zero-trust,

To Achieve Cyber Resilience, We Need to Rethink One Core Security Principle

As an industry, we need to begin viewing ransomware as inevitable and prepare for cyber resilience when an attack occurs ...
Security Boulevard

The Cyber Resilience Imperative for Software Supply Chain Security

The concepts of cyber resilience and software supply chain security go hand in hand. It’s heartening that many organizations now recognize the cybersecurity landscape continues to evolve and grow more sophisticated and ...
War-Time vs Peace-Time Vulnerability Management

War-Time vs Peace-Time Vulnerability Management

In the military, you approach periods of war and peace differently. Peace-time is used to train the troops for battle. Peace-time’s stability is used to steadily enhance assets and strategic position for ...
DoD cybersecurity

The Power of Provenance: From Reactive to Proactive Cybersecurity

While next-gen firewalls (NGFW), extended detection and response (XDR) and other security solutions do a great job of detecting and thwarting cyberattacks, it’s just too common for a sneaky or camouflaged threat ...
Security Boulevard
Balbix brings Snow and Ice to Vegas @ BlackHat 2022

Balbix brings Snow and Ice to Vegas @ BlackHat 2022

Here we go again – it’s BlackHat time! As you head over to Las Vegas, you might be mulling over recent discussions you have had with your CFO after the Q2 board ...

HITRUST: the Path to Cyber Resilience

There has been a lot of talk recently about cyber resilience. There is no doubt that the ability to bounce back from a security event is important, however, all of the resiliency ...

The Cyber Assessment Framework: Guided Cyber Resilience

Remember how, just a few years ago, many organizations were striving to be cyber secure? Over the last years, it seemed that crowing about one’s cybersecurity posture became the very thing that mocked ...

Building Cyber Resilience in a heightened alert environment

There has been a lot of talk about cyber weapons and the cyber dimension of global politics after the NotPetya and WannaCry attacks of 2017 and the Stuxnet worm, first discovered in ...