5 reasons why you should work at Balbix (and 3 reasons why you should not ….)

5 reasons why you should work at Balbix (and 3 reasons why you should not ….)

So you have been thinking about your next career move and the thought of building, selling (or supporting/implementing, etc.) exciting stuff like AI or cybersecurity has crossed your mind. You are not sure if you want to risk a startup, or stay within the comfort zone of a big company ... Read More
Quantifying cyber-risk for your BoD and c-suite colleagues

Quantifying cyber-risk for your BoD and c-suite colleagues

How should you report on your organization's cybersecurity posture to your board of directors and C-suite colleagues? As you know very well, your board members’ and senior executives view of cybersecurity is quite different from how security and IT team members think. It can be quite frustrating to try to ... Read More
Context: Your Super-Weapon in Vulnerability Management?

Context: Your Super-Weapon in Vulnerability Management?

Merriam Webster defines context as the interrelated conditions in which something exists or occurs—such as the environment or setting. Another definition for the word context is also “parts of a discourse that surround a word or passage that can throw light on its meaning.” ... Read More
Why Modern Enterprises Require Risk-Based Vulnerability Management

Why Modern Enterprises Require Risk-Based Vulnerability Management

Cyberattacks are an increasing concern for organizations in every sector. Complicating the matter is the level of sophistication of modern attacks, and the fact that too many organizations, hamstrung by limited resources, end up relying on outdated security technology and processes. These challenges extend to traditional vulnerability management (VM) which ... Read More
passkeys, passwords, mobile strategy

The Secret Lives of Passwords

If there is one thing every internet user probably shares, it’s a frustration with passwords. Originally invented as an optional way to keep computer accounts private, passwords have become the default authentication method, the keys to our online worlds—and constant sources of misery. Perhaps less well-understood, though, is the fact ... Read More
Security Boulevard
Loading...

Application Security Check Up