CAASM: Dead-End Approach or Worthwhile Journey?

Cyber Asset Attack Surface Management (CAASM) is focused on enabling security teams to overcome asset visibility. Asset visibility is foundational to security programs  — knowing what assets exist in their environment and ...

Balbix Recognized in Three 2024 Gartner® Hype Cycle™ Reports

A couple of weeks ago, Balbix was recognized as a Representative Vendor in the newly created Exposure Assessment Platforms (EAPs) category in the Gartner® Hype Cycle™ reports for Security Operations and Managing ...

Extending Resilience: Reducing Stress and Burnout for Cybersecurity Teams

Resilience is now the prevailing ethos and strategy for cybersecurity programs. This idea is typified by the axioms, “assume breach,” or “not if, but when.” Cybersecurity’s journey to a resilience model makes ...

Negotiate Your Next Cyber Insurance Policy With This 6-Step Playbook

TL;DR: Cyber liability insurance is essential, but premiums are increasing, and numerous exclusions exist. Important steps to lower premiums include preparation, articulating your risk, and demonstrating progressive improvement in security through measurable ...
Crowdsrike response

Understanding Your IT Dependencies: Unpacking the Crowdstrike Windows Outage

Happy almost weekend, everybody…or, not, if you’re in IT…or trying to travel…or get medical attention…or just get your work done and start the weekend off with a bang… Many of us have ...

Ponemon Report: The Top Three AI Cyber Risks Revealed

The 2024 State of Enterprise Cyber Risk in the Age of AI report, independently conducted by Ponemon Institute and analyzed and published by Balbix, is fueled by over 20,000 answers from hundreds ...
image1

It is Time to Reclaim Control (and Responsibility) Over Your Application Security

In recent years, the cybersecurity industry has embraced a “shift left” approach, advocating for security considerations to be integrated earlier in the software development lifecycle. This strategy, born from a desire to ...

Strategies to Safeguard the Finance Industry Against Deepfake Onslaught

With the rise of deepfake technology, the financial sector faces a new and growing threat landscape, as malicious actors exploit artificial intelligence (AI)-generated content to perpetrate fraud and social engineering attacks. However, ...
Statistics on evolving security strategies - LogRhythm 2024 State of the Security Team Research.

CISO Panel: How Security Teams Are Evolving Their Strategies in 2024

The cybersecurity industry is experiencing significant shifts in 2024. LogRhythm’s State of the Security Team global research reveals a whopping 95% of organizations have adjusted their security strategy this year. These changes ...
LogRhythm Machine Data Intelligence Fabric

How to Ensure Your Data is Ready for an AI-Driven SOC 

In 2024, artificial intelligence (AI) has prompted 65% of organizations to evolve their security strategies. Across the globe, this technological revolution has pushed security and business leaders to think critically about how ...

Application Security Check Up