7 Reasons to be Thankful for Your Cybersecurity Team

7 Reasons to be Thankful for Your Cybersecurity Team

| | cyber resilience
Enterprise cybersecurity teams do more than keep organizations safe. At its core, the information these folks secure is about people — customers, employees, partners. So, keeping organizations secure ultimately means securing people’s digital lives. Cybersecurity teams are usually only acknowledged when something goes wrong. Yet for every cyber breach, there ... Read More
7 Reasons to be Thankful for Your Cybersecurity Team

7 Reasons to be Thankful for Your Cybersecurity Team

| | cyber resilience
Enterprise cybersecurity teams do more than keep organizations safe. At its core, the information these folks secure is about people — customers, employees, partners. So, keeping organizations secure ultimately means securing people’s digital lives. Cybersecurity teams are usually only acknowledged when something goes wrong. Yet for every cyber breach, there ... Read More
Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out

Operationalize the NIST Cybersecurity Framework Without Pulling All Your Hair Out

If you are reading this, you may have decided to upgrade your ad-hoc cybersecurity program to be compliant with the NIST Cybersecurity Framework. Your CEO or audit committee might have asked about this, or perhaps one of your CISO-friends suggested this. First off, you should know that your cybersecurity program ... Read More
End that Zoom call and take a step back…

End that Zoom call and take a step back…

| | security posture
If you are the CISO of a mid-sized enterprise, end that zoom call and take a step back. You probably spent 60+ hrs in Zoom meetings this week. Your team has been working really hard over the last few months dealing with the change to a work-from-home workforce. Lots of ... Read More
The Big Lie in Threat Hunting

The Big Lie in Threat Hunting

Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very manual process where trained “hunters” combine expertise in attacker behavior and techniques combined with a deep knowledge of ... Read More
The Big Lie in Threat Hunting

The Big Lie in Threat Hunting

Wikipedia defines cyber threat hunting as “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” In practice, this is a very manual process where trained “hunters” combine expertise in attacker behavior and techniques combined with a deep knowledge of ... Read More
Job Centric Design: The Next Generation of Cybersecurity

Job Centric Design: The Next Generation of Cybersecurity

| | security posture
When NASA and SpaceX successfully launched the Crew Dragon capsule atop a Falcon 9 rocket, docking it with the International Space Station, it provided a much needed moment of optimism and positivity in an otherwise fractured and frightening time for our society. It also provided a glimpse into the technological ... Read More
Founders on Fire with with Gaurav Banga, Founder and CEO of Balbix

Q&A with Tech Trailblazer Gaurav Banga

Balbix Founder and CEO Gaurav Banga sat down with Rose Ross, host of Founders on Fire podcast, to talk about how AI is vital to solving the challenges of cybersecurity, which is no longer a human-scale problem. The two talk also talk about the challenges of building and scaling start-ups ... Read More
Reflections on an Amazing 2019 at Balbix

Reflections on an Amazing 2019 at Balbix

Balbix accomplished many milestones in 2019. We grew our revenue more than 4x, closed several multi-million-dollar contracts, and with over fifty large enterprises in production we continue to extend our leadership in the emerging cyber-risk visibility and transformation market ... Read More
An open conversation about cyber-risk reporting to the BOD

An open conversation about cyber-risk reporting to the BOD

A few days ago, I had the privilege of moderating a boardroom discussion of CISOs at the Evanta Dallas CISO Summit on the topic of Cyber-Risk Reporting for the Board. Evanta’s boardroom discussions are great since they serve as fantastic opportunities to benchmark various CISO topics, and to discover new ... Read More

Application Security Check Up