Balbix brings Snow and Ice to Vegas @ BlackHat 2022

Balbix brings Snow and Ice to Vegas @ BlackHat 2022

Here we go again – it’s BlackHat time! As you head over to Las Vegas, you might be mulling over recent discussions you have had with your CFO after the Q2 board meeting.  First, the bucket of gloomy items in your head:  Your company is trimming spending by 25% across ... Read More
A Fireside Chat with John Chambers

A Fireside Chat with John Chambers

Recently, everyone at Balbix got a fantastic treat. John Chambers, globally renowned tech CEO and one of Balbix’s earliest investors, joined our team for a fireside chat. What started as a casual conversation, quickly turned into valuable leadership lessons and insights for the Balbix team to incorporate into our everyday ... Read More
Announcing Our Series C Funding and Balbix’s Next Chapter

Announcing Our Series C Funding and Balbix’s Next Chapter

Today’s official headline is that we have raised $70 million in our Series C funding round.   Of course, this is a major milestone for Balbix. Normally, I would be expected to list the stellar list of firms participating in this oversubscribed round, talk about hypergrowth in our ARR in 2021 ... Read More
Log4j Memo to the CEO, CFO and other CXOs

Log4j Memo to the CEO, CFO and other CXOs

| | security posture
If you are the CEO, CFO or CXO of a major corporation, you are probably aware of Log4j, and perhaps perplexed by the unprecedented impact it has had on your infosec and IT teams. You might be wondering how Log4j is different from vanilla cybersecurity issues. Perhaps you are waiting ... Read More
Is It Time to Rethink That Cybersecurity Data Lake?

Is It Time to Rethink That Cybersecurity Data Lake?

You have probably heard the story of the kid who had everything but was still sad. Here is a tale of a CISO who has everything but is still very unhappy because she can’t quantify her organization’s cyber risk… Our CISO’s organization has invested in dozens of cybersecurity tools in ... Read More
Colonial Pipeline Surprise Attack? No Really…

Colonial Pipeline Surprise Attack? No Really…

| | security posture
The media is abuzz with the news of the main fuel supply line to the U.S. East Coast being shut down after the pipeline’s operator, Colonial, suffered what is believed to be the largest successful cyberattack on oil infrastructure in the country’s history. Was the infosec industry surprised? If you ... Read More
The Need for Speed in Cybersecurity

The Need for Speed in Cybersecurity

Friday is my favorite day of the week. This is the day I set aside to connect with CISOs in Balbix’s advisory council, in our customer base, and in the broader industry. These are not selling sessions – instead they are about listening, introspecting, and brainstorming. My objective is to ... Read More
What Do White Chocolate Macadamia Nut Cookies Have to Do With Cybersecurity Posture?

What Do White Chocolate Macadamia Nut Cookies Have to Do With Cybersecurity Posture?

| | security posture
Picture this. You walk into the kitchen. On the counter, is a beautiful charcoal gray plate. And right in the center of the plate is a perfectly round cookie. You are tempted, of course. You reach for the cookie, take a bite, and close your eyes in anticipation of a ... Read More
Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out (Part 2 of 3)

Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out (Part 2 of 3)

| | security posture
This is the Part 2 of a 3-part blog on how to use the NIST cybersecurity framework without getting bogged down and lost in the minutia of the specification documents. Part 1 can be found here, and we recommend you read this piece first if you have not already done ... Read More
Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out (Part 2 of 3)

Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out (Part 2 of 3)

| | security posture
This is the Part 2 of a 3-part blog on how to use the NIST cybersecurity framework without getting bogged down and lost in the minutia of the specification documents. Part 1 can be found here, and we recommend you read this piece first if you have not already done ... Read More

Application Security Check Up