A Low Effort Guide to Keeping Tabs on Your Security Posture

It is a fact that seeing “green”, especially when it comes to your security posture, feels good. And the more green it is, the happier you are. Yes, seeing green requires effort. But Balbix makes it easy. Here’s how one Balbix customer keeps tabs on h… Continue reading A Low Effort Guide to Keeping Tabs on Your Security Posture

Setting Up a Hacker-Proof Infosec Team

What’s the rockstar CISO’s favorite song? Smells like Team Spirit! Cheesy jokes aside, if you are or wish to be a rockstar CISO you know that you can’t do it alone. You need a team that is completely aligned to your organization’s overarching security… Continue reading Setting Up a Hacker-Proof Infosec Team

New CISO? Top 5 Things You Need to Know

Starting in a new role is always a challenge, and if it’s the position of a CISO, it’s likely that you have concerns. As a new CISO, early performance will be critical to success in your new role. In the first few months, you’ll be assessed by colleag… Continue reading New CISO? Top 5 Things You Need to Know

Making Infosec Jobs Easier: Responding to Cybersecurity Incidents

This is post 9 in our series on making infosec jobs easier. Today we are covering the job of responding to cybersecurity incidents. You can read the previous 8 posts at one of the links below. Improve overall security posture Assess and report on brea… Continue reading Making Infosec Jobs Easier: Responding to Cybersecurity Incidents

Making Infosec Jobs Easier: Keeping Systems Patched

This is post 3 in our ongoing blog series on making infosec jobs easier. The first post covered the job of improving overall security posture, the second talked about assessing and reporting on breach risk. In this post, we discuss the job of keeping … Continue reading Making Infosec Jobs Easier: Keeping Systems Patched

6 Issues that Undermine Your Vulnerability Management Team’s Ability to Keep Systems Patched

One of the main jobs of a vulnerability management team is to keep all systems patched to safeguard your enterprise network and data. To do this effectively, you need to first know what systems you have, namely an inventory of your enterprise IT a… Continue reading 6 Issues that Undermine Your Vulnerability Management Team’s Ability to Keep Systems Patched