Thought Leadership

Beyond the CISO: Leveraging a Deputy for Strategic Security
The Strategic Importance of a Deputy CISO The role of a Chief Information Security Officer (CISO) is constantly evolving, often expanding to encompass responsibilities beyond the traditional security domain. When a CISO's ...

Strobes Security 2024: Year in Review
2024 has been a year of bold moves and big wins at Strobes Security. From launching game-changing innovations to expanding globally, we’ve made strides to reshape cybersecurity for the better.... The post ...
Top 11 Cybersecurity Questions Every CISO Should Be Ready to Answer
Chief Information Security Officers (CISOs) should always anticipate questions that might arise during presentations to senior leaders and corporate boards. Below, we present some typical questions that CISOs should be prepared to ...
CAASM: Dead-End Approach or Worthwhile Journey?
Cyber Asset Attack Surface Management (CAASM) is focused on enabling security teams to overcome asset visibility. Asset visibility is foundational to security programs — knowing what assets exist in their environment and ...
Balbix Recognized in Three 2024 Gartner® Hype Cycle™ Reports
A couple of weeks ago, Balbix was recognized as a Representative Vendor in the newly created Exposure Assessment Platforms (EAPs) category in the Gartner® Hype Cycle™ reports for Security Operations and Managing ...
Extending Resilience: Reducing Stress and Burnout for Cybersecurity Teams
Resilience is now the prevailing ethos and strategy for cybersecurity programs. This idea is typified by the axioms, “assume breach,” or “not if, but when.” Cybersecurity’s journey to a resilience model makes ...
Negotiate Your Next Cyber Insurance Policy With This 6-Step Playbook
TL;DR: Cyber liability insurance is essential, but premiums are increasing, and numerous exclusions exist. Important steps to lower premiums include preparation, articulating your risk, and demonstrating progressive improvement in security through measurable ...

Understanding Your IT Dependencies: Unpacking the Crowdstrike Windows Outage
Happy almost weekend, everybody…or, not, if you’re in IT…or trying to travel…or get medical attention…or just get your work done and start the weekend off with a bang… Many of us have ...
Ponemon Report: The Top Three AI Cyber Risks Revealed
The 2024 State of Enterprise Cyber Risk in the Age of AI report, independently conducted by Ponemon Institute and analyzed and published by Balbix, is fueled by over 20,000 answers from hundreds ...

It is Time to Reclaim Control (and Responsibility) Over Your Application Security
In recent years, the cybersecurity industry has embraced a “shift left” approach, advocating for security considerations to be integrated earlier in the software development lifecycle. This strategy, born from a desire to ...